APSIPA Transactions on Signal and Information Processing > Vol 9 > Issue 1

Advances in anti-spoofing: from the perspective of ASVspoof challenges

Madhu R. Kamble, Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), India, madhu_kamble@daiict.ac.in , Hardik B. Sailor, University of Sheffield, UK, Hemant A. Patil, Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), India, Haizhou Li, National University of Singapore (NUS), Singapore
 
Suggested Citation
Madhu R. Kamble, Hardik B. Sailor, Hemant A. Patil and Haizhou Li (2020), "Advances in anti-spoofing: from the perspective of ASVspoof challenges", APSIPA Transactions on Signal and Information Processing: Vol. 9: No. 1, e2. http://dx.doi.org/10.1017/ATSIP.2019.21

Publication Date: 15 Jan 2020
© 2020 Madhu R. Kamble, Hardik B. Sailor, Hemant A. Patil and Haizhou Li
 
Subjects
 
Keywords
Automatic speaker verification (ASV)Spoofing attacksDatabasePerformance evaluation metricCountermeasures
 

Share

Open Access

This is published under the terms of the Creative Commons Attribution licence.

Downloaded: 4647 times

In this article:
I. INTRODUCTION 
II. ASV SYSTEM: SPOOFING ATTACKS 
III. DATABASES AND PERFORMANCE EVALUATION METRICS 
IV. COUNTERMEASURES FOR SYNTHETIC SPOOFING ATTACKS 
V. COUNTERMEASURES FOR REPLAY SPOOFING ATTACKS 
VI. LIMITATIONS AND TECHNOLOGICAL CHALLENGES 
VII. SUMMARY AND CONCLUSIONS 

Abstract

In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics. This leads to an increased interest to secure these voice biometric systems for real-world applications. The ASV systems are vulnerable to various kinds of spoofing attacks, namely, synthetic speech (SS), voice conversion (VC), replay, twins, and impersonation. This paper provides the literature review of ASV spoof detection, novel acoustic feature representations, deep learning, end-to-end systems, etc. Furthermore, the paper also summaries previous studies of spoofing attacks with emphasis on SS, VC, and replay along with recent efforts to develop countermeasures for spoof speech detection (SSD) task. The limitations and challenges of SSD task are also presented. While several countermeasures were reported in the literature, they are mostly validated on a particular database, furthermore, their performance is far from perfect. The security of voice biometrics systems against spoofing attacks remains a challenging topic. This paper is based on a tutorial presented at APSIPA Annual Summit and Conference 2017 to serve as a quick start for those interested in the topic.

DOI:10.1017/ATSIP.2019.21