Spoofing and countermeasures for speaker verification: a survey

Wu, Zhizheng; Evans, Nicholas; Kinnunen, Tomi; Yamagishi, Junichi; Alegre, Federico; Li, Haizhou
Elsevier Speech Communications, 2014

While biometric authentication has advanced significantly in recent years, evidence shows the technology can be susceptible to malicious spoofing attacks. The research community has responded with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; biometric systems remain vulnerable to spoofing. Despite a growing momentum to develop spoofing countermeasures for automatic speaker verification, now that the technology has matured sufficiently to support mass deployment in an array of diverse applications, greater effort will be needed in the future to ensure adequate protection against spoofing. This article provides a survey of past work and identifies priority research directions for the future. We summarise previous studies involving impersonation, replay, speech synthesis and voice conversion spoofing attacks and more recent efforts to develop dedicated countermeasures. The survey shows that future research should address the lack of standard datasets and the over-fitting of existing countermeasures to specific, known spoofing attacks.

Sécurité numérique
Eurecom Ref:
© Elsevier. Personal use of this material is permitted. The definitive version of this paper was published in Elsevier Speech Communications, 2014 and is available at : http://dx.doi.org/10.1016/j.specom.2014.10.005

PERMALINK : https://www.eurecom.fr/publication/4436