Spoofing and countermeasures for speaker verification: A survey

Z Wu, N Evans, T Kinnunen, J Yamagishi, F Alegre… - speech …, 2015 - Elsevier
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …

The attacker's perspective on automatic speaker verification: An overview

RK Das, X Tian, T Kinnunen, H Li - arXiv preprint arXiv:2004.08849, 2020 - arxiv.org
Security of automatic speaker verification (ASV) systems is compromised by various
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …

ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech

A Nautsch, X Wang, N Evans… - … and Identity Science, 2021 - ieeexplore.ieee.org
The ASVspoof initiative was conceived to spearhead research in anti-spoofing for automatic
speaker verification (ASV). This paper describes the third in a series of bi-annual …

Biometric antispoofing methods: A survey in face recognition

J Galbally, S Marcel, J Fierrez - Ieee Access, 2014 - ieeexplore.ieee.org
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …

Personal voice assistant security and privacy—a survey

P Cheng, U Roedig - Proceedings of the IEEE, 2022 - ieeexplore.ieee.org
Personal voice assistants (PVAs) are increasingly used as interfaces to digital environments.
Voice commands are used to interact with phones, smart homes, or cars. In the United …

You can hear but you cannot steal: Defending against voice impersonation attacks on smartphones

S Chen, K Ren, S Piao, C Wang… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
Voice, as a convenient and efficient way of information delivery, has a significant advantage
over the conventional keyboard-based input methods, especially on small mobile devices …

[PDF][PDF] Spoofing and countermeasures for automatic speaker verification

NWD Evans, T Kinnunen… - … 2013, 14th Annual …, 2013 - research.ed.ac.uk
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also
known as imposture. While vulnerabilities and countermeasures for other biometric …

Reversing the irreversible: A survey on inverse biometrics

M Gomez-Barrero, J Galbally - Computers & Security, 2020 - Elsevier
With the widespread use of biometric recognition, several issues related to the privacy and
security provided by this technology have been recently raised and analysed. As a result …

The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification

C Yan, Y Long, X Ji, W Xu - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Verifying the identity of voice inputs is important as voices are increasingly used for sensitive
operations. Traditional methods focus on differentiating individuals via the spectrographic …

Introduction to voice presentation attack detection and recent advances

M Sahidullah, H Delgado, M Todisco, A Nautsch… - Handbook of Biometric …, 2023 - Springer
Over the past few years, significant progress has been made in the field of presentation
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …