Gajan Suthokumar, Kaavya Sriskandaraja, V. Sethu, C. Wijenayake, E. Ambikairajah, Haizhou Li
{"title":"使用声明扬声器模型进行重放检测","authors":"Gajan Suthokumar, Kaavya Sriskandaraja, V. Sethu, C. Wijenayake, E. Ambikairajah, Haizhou Li","doi":"10.23919/APSIPA.2018.8659510","DOIUrl":null,"url":null,"abstract":"Replay attacks are the simplest form of spoofing attacks on automatic speaker verification (ASV) systems and consequently the detection of these attacks is a critical research problem. Currently, most research on replay detection focuses on developing a stand-alone countermeasure that runs independently of a speaker verification system by training a single common spoofed model as well as a single common genuine model. This paper investigates the potential advantages of sharing speaker data between the speaker verification system and the replay detection system. Specifically, it explores the benefits of using the claimed speaker's model in place of the common genuine model. The proposed approach is validated on a modified evaluation set of the ASVspoof 2017 version 2.0 corpus and show that the use of adapted speaker models is far superior to the use of a single common genuine model.","PeriodicalId":287799,"journal":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Use of Claimed Speaker Models for Replay Detection\",\"authors\":\"Gajan Suthokumar, Kaavya Sriskandaraja, V. Sethu, C. Wijenayake, E. Ambikairajah, Haizhou Li\",\"doi\":\"10.23919/APSIPA.2018.8659510\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Replay attacks are the simplest form of spoofing attacks on automatic speaker verification (ASV) systems and consequently the detection of these attacks is a critical research problem. Currently, most research on replay detection focuses on developing a stand-alone countermeasure that runs independently of a speaker verification system by training a single common spoofed model as well as a single common genuine model. This paper investigates the potential advantages of sharing speaker data between the speaker verification system and the replay detection system. Specifically, it explores the benefits of using the claimed speaker's model in place of the common genuine model. The proposed approach is validated on a modified evaluation set of the ASVspoof 2017 version 2.0 corpus and show that the use of adapted speaker models is far superior to the use of a single common genuine model.\",\"PeriodicalId\":287799,\"journal\":{\"name\":\"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/APSIPA.2018.8659510\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/APSIPA.2018.8659510","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Use of Claimed Speaker Models for Replay Detection
Replay attacks are the simplest form of spoofing attacks on automatic speaker verification (ASV) systems and consequently the detection of these attacks is a critical research problem. Currently, most research on replay detection focuses on developing a stand-alone countermeasure that runs independently of a speaker verification system by training a single common spoofed model as well as a single common genuine model. This paper investigates the potential advantages of sharing speaker data between the speaker verification system and the replay detection system. Specifically, it explores the benefits of using the claimed speaker's model in place of the common genuine model. The proposed approach is validated on a modified evaluation set of the ASVspoof 2017 version 2.0 corpus and show that the use of adapted speaker models is far superior to the use of a single common genuine model.