Spoofing and countermeasures for automatic speaker verification

@inproceedings{Evans2013SpoofingAC,
  title={Spoofing and countermeasures for automatic speaker verification},
  author={Nicholas W. D. Evans and Tomi Kinnunen and Junichi Yamagishi},
  booktitle={INTERSPEECH},
  year={2013}
}
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work to develop spoofing countermeasures. The paper concludes with a discussion on the need for standard… CONTINUE READING
Highly Cited
This paper has 137 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 67 extracted citations

138 Citations

02040'14'15'16'17'18'19
Citations per Year
Semantic Scholar estimates that this publication has 138 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 41 references

Voice forgery using ALISP: indexation in a client memory

Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005. • 2005
View 4 Excerpts
Highly Influenced

Spoofing countermeasures to protect automatic speaker verification from voice conversion

2013 IEEE International Conference on Acoustics, Speech and Signal Processing • 2013
View 1 Excerpt

Probabilistic Models for Inference about Identity

IEEE Transactions on Pattern Analysis and Machine Intelligence • 2012
View 2 Excerpts

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech

2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) • 2012
View 1 Excerpt

Similar Papers

Loading similar papers…