Spoofing and countermeasures for speaker verification: A survey
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …
the technology can be susceptible to malicious spoofing attacks. The research community …
The attacker's perspective on automatic speaker verification: An overview
Security of automatic speaker verification (ASV) systems is compromised by various
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …
ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
The ASVspoof initiative was conceived to spearhead research in anti-spoofing for automatic
speaker verification (ASV). This paper describes the third in a series of bi-annual …
speaker verification (ASV). This paper describes the third in a series of bi-annual …
Biometric antispoofing methods: A survey in face recognition
In recent decades, we have witnessed the evolution of biometric technology from the first
pioneering works in face and voice recognition to the current state of development wherein a …
pioneering works in face and voice recognition to the current state of development wherein a …
Personal voice assistant security and privacy—a survey
Personal voice assistants (PVAs) are increasingly used as interfaces to digital environments.
Voice commands are used to interact with phones, smart homes, or cars. In the United …
Voice commands are used to interact with phones, smart homes, or cars. In the United …
You can hear but you cannot steal: Defending against voice impersonation attacks on smartphones
Voice, as a convenient and efficient way of information delivery, has a significant advantage
over the conventional keyboard-based input methods, especially on small mobile devices …
over the conventional keyboard-based input methods, especially on small mobile devices …
[PDF][PDF] Spoofing and countermeasures for automatic speaker verification
NWD Evans, T Kinnunen… - … 2013, 14th Annual …, 2013 - research.ed.ac.uk
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also
known as imposture. While vulnerabilities and countermeasures for other biometric …
known as imposture. While vulnerabilities and countermeasures for other biometric …
Reversing the irreversible: A survey on inverse biometrics
M Gomez-Barrero, J Galbally - Computers & Security, 2020 - Elsevier
With the widespread use of biometric recognition, several issues related to the privacy and
security provided by this technology have been recently raised and analysed. As a result …
security provided by this technology have been recently raised and analysed. As a result …
The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification
Verifying the identity of voice inputs is important as voices are increasingly used for sensitive
operations. Traditional methods focus on differentiating individuals via the spectrographic …
operations. Traditional methods focus on differentiating individuals via the spectrographic …
Introduction to voice presentation attack detection and recent advances
Over the past few years, significant progress has been made in the field of presentation
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …