Ecole d'ingénieur et centre de recherche en Sciences du numérique

Anti-spoo fing: voice databases

Alegre, Federico; Evans, Nicholas; Kinnunen, Tomi; Wu, Zhizheng; Yamagishi, Junichi

Book Chapter in "Handbook of Biometric Anti-spoofing", Springer, S. Marcel, S. Li and M. Nixon, Eds., 2014

As with any task involving statistical pattern recognition, the assessment of spoofi ng and anti-spoo ng approaches for voice recognition calls for signi cantscale databases of spoofed speech signals. Depending on the application, these signals should normally reflect spoo ng attacks performed prior to acquisition at the sensor or microphone. Since the collection of large quantities of any biometric data is always extremely time consuming and cost prohibitive, and consistent with some telephony applications, almost all of the existing work to assess spoofing and anti-spoo ng in voice recognition is performed with databases of speech signals subjected to post-sensor spoo ng attacks. While such a setup can be justi ed, the lack of suitable sensor-level databases is a weakness in the research eld. Additionally, whereas spoo ng relates to authentication, and thus predominantly text-dependent scenarios, the majority of the related work involves the use of text-independent databases better suited to surveillance applications than to authentication and spoo ng.

Document Doi Bibtex

Titre:Anti-spoo fing: voice databases
Mots Clés:Speaker recognition spoo ng; speaker recognition corpora
Département:Sécurité numérique
Eurecom ref:4439
Copyright: © Springer. Personal use of this material is permitted. The definitive version of this paper was published in Book Chapter in "Handbook of Biometric Anti-spoofing", Springer, S. Marcel, S. Li and M. Nixon, Eds., 2014 and is available at :
Bibtex: @book{EURECOM+4439, doi = {}, year = {2014}, title = {{A}nti-spoo fing: voice databases}, author = {{A}legre, {F}ederico and {E}vans, {N}icholas and {K}innunen, {T}omi and {W}u, {Z}hizheng and {Y}amagishi, {J}unichi}, publisher = {{B}ook {C}hapter in "{H}andbook of {B}iometric {A}nti-spoofing", {S}pringer, {S}. {M}arcel, {S}. {L}i and {M}. {N}ixon, {E}ds., 2014}, month = {06}, url = {} }
Voir aussi: