Spoofing and countermeasures for automatic speaker verification

Evans, Nick
WSB 2017, IEEE SPS Winter School on Security and Privacy Issues in Biometrics, January 7-12, 2017, Saadiyat Island, Abu Dhabi

Most, if not all biometric systems can be vulnerable to presentation attacks or spoofing. Spoofing involves the circumvention of a biometric system by a fraudster who masquerades as another enrolled client through the mimicking of their biometric traits. Spoofing attacks can be used to infiltrate systems or services protected by biometric technology, can undermine user confidence, and thus form a barrier to exploitation.

This talk will present recent work to develop presentation attack detection or countermeasure systems to protect speaker verification systems from diverse spoofing attacks including replay, speech synthesis and voice conversion. The talk will present the community-led ASVspoof initiative and the associated, competitive ASVspoof 2015 Challenge and results, alongside other common databases and evaluations, namely AVspoof and RedDots Replayed. The talk will cover progress in the field and present a treatment of constant Q cepstral coefficients (CQCCs) which are especially effective in distinguishing between genuine and spoofed speech. The talk will conclude with a brief discussion of current challenges and directions for future research.

Abu Dhabi
Digital Security
Eurecom Ref:
© 2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
See also:

PERMALINK : https://www.eurecom.fr/publication/5103