DNN Filter Bank Cepstral Coefficients for Spoofing Detection
نویسندگان
چکیده
منابع مشابه
A New Feature for Automatic Speaker Verification Anti-Spoofing: Constant Q Cepstral Coefficients
Efforts to develop new countermeasures in order to protect automatic speaker verification from spoofing have intensified over recent years. The ASVspoof 2015 initiative showed that there is great potential to detect spoofing attacks, but also that the detection of previously unforeseen spoofing attacks remains challenging. This paper argues that there is more to be gained from the study of feat...
متن کاملConstant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification
Recent evaluations such as ASVspoof 2015 and the similarly-named AVspoof have stimulated a great deal of progress to develop spoofing countermeasures for automatic speaker verification. This paper reports an approach which combines speech signal analysis using the constant Q transform with traditional cepstral processing. The resulting constant Q cepstral coefficients (CQCCs) were introduced re...
متن کاملSpoofing Detection on the ASVspoof2015 Challenge Corpus Employing Deep Neural Networks
This paper describes the application of deep neural networks (DNN), trained to discriminate between human and spoofed speech signals, to improve the performance of spoofing detection. In this work we use amplitude, phase, linear prediction residual, and combined amplitude phase-based acoustic level features. First we train a DNN on the spoofing challenge training data to discriminate between hu...
متن کاملEvolutionary cepstral coefficients
Evolutionary algorithms provide flexibility and robustness required to find satisfactory solutions in complex search spaces. This is why they are successfully applied for solving real engineering problems. In this work we propose an algorithm to evolve a robust speech representation, using a dynamic data selection method for reducing the computational cost of the fitness computation while impro...
متن کاملSpoofing detection with DNN and one-class SVM for the ASVspoof 2015 challenge
Speaker verification systems have achieved great performance in recent times. However, we usually measure performance on a ideal scenarios with naive impostors that do not modify their voices to impersonate the target speakers. The fact of impersonating a legitimate user is known as spoofing attack. Recent works show the vulnerability of current speaker verification technology to several types ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2017
ISSN: 2169-3536
DOI: 10.1109/access.2017.2687041