Graduate School and Research Center in Digital Sciences

Anti-spoo fing: voice databases

Alegre, Federico; Evans, Nicholas; Kinnunen, Tomi; Wu, Zhizheng; Yamagishi, Junichi

Book Chapter in "Handbook of Biometric Anti-spoofing", Springer, S. Marcel, S. Li and M. Nixon, Eds., 2014

As with any task involving statistical pattern recognition, the assessment of spoofi ng and anti-spoo ng approaches for voice recognition calls for signi cantscale databases of spoofed speech signals. Depending on the application, these signals should normally reflect spoo ng attacks performed prior to acquisition at the sensor or microphone. Since the collection of large quantities of any biometric data is always extremely time consuming and cost prohibitive, and consistent with some telephony applications, almost all of the existing work to assess spoofing and anti-spoo ng in voice recognition is performed with databases of speech signals subjected to post-sensor spoo ng attacks. While such a setup can be justi ed, the lack of suitable sensor-level databases is a weakness in the research eld. Additionally, whereas spoo ng relates to authentication, and thus predominantly text-dependent scenarios, the majority of the related work involves the use of text-independent databases better suited to surveillance applications than to authentication and spoo ng.

Document Doi Bibtex

Title:Anti-spoo fing: voice databases
Keywords:Speaker recognition spoo ng; speaker recognition corpora
Department:Digital Security
Eurecom ref:4439
Copyright: © Springer. Personal use of this material is permitted. The definitive version of this paper was published in Book Chapter in "Handbook of Biometric Anti-spoofing", Springer, S. Marcel, S. Li and M. Nixon, Eds., 2014 and is available at :
Bibtex: @book{EURECOM+4439, doi = {}, year = {2014}, title = {{A}nti-spoo fing: voice databases}, author = {{A}legre, {F}ederico and {E}vans, {N}icholas and {K}innunen, {T}omi and {W}u, {Z}hizheng and {Y}amagishi, {J}unichi}, publisher = {{B}ook {C}hapter in "{H}andbook of {B}iometric {A}nti-spoofing", {S}pringer, {S}. {M}arcel, {S}. {L}i and {M}. {N}ixon, {E}ds., 2014}, month = {06}, url = {} }
See also: