Show simple item record

dc.contributor.authorAlegre, Federico
dc.contributor.authorJanicki, Artur
dc.contributor.authorEvans, Nicholas
dc.contributor.editorBrömme, Arslan
dc.contributor.editorBusch, Christoph
dc.date.accessioned2017-07-26T10:54:16Z
dc.date.available2017-07-26T10:54:16Z
dc.date.issued2014
dc.identifier.isbn978-3-88579-624-4
dc.identifier.issn1617-5468
dc.description.abstractThis paper re-examines the threat of spoofing or presentation attacks in the context of automatic speaker verification (ASV). While voice conversion and speech synthesis attacks present a serious threat, and have accordingly received a great deal of attention in the recent literature, they can only be implemented with a high level of technical know-how. In contrast, the implementation of replay attacks require no specific expertise nor any sophisticated equipment and thus they arguably present a greater risk. The comparative threat of each attack is re-examined in this paper against six different ASV systems including a state-of-the-art iVector-PLDA system. Despite the lack of attention in the literature, experiments show that low-effort replay attacks provoke higher levels of false acceptance than comparatively higher-effort spoofing attacks such as voice conversion and speech synthesis. Results therefore show the need to refocus research effort and to develop countermeasures against replay attacks in future work.en
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofBIOSIG 2014
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-230
dc.titleRe-assessing the threat of replay spoofing attacks against automatic speaker verificationen
dc.typeText/Conference Paper
dc.pubPlaceBonn
mci.reference.pages157-168
mci.conference.locationDarmstadt
mci.conference.date10.-12. September 2014


Files in this item

Thumbnail

Show simple item record