ASVspoof 2015: Automatic Speaker Verification Spoofing and Countermeasures Challenge Evaluation Plan
نویسندگان
چکیده
The ASVspoof initiative follows on from the first special session in spoofing and countermeasures for automatic speaker verification (ASV) held during the 2013 edition of INTERSPEECH in Lyon, France [1]. The vision behind that first edition was to promote the consideration of spoofing, to encourage the development of anti-spoofing countermeasures and to gather a community to design, collect and distribute standard databases with standard evaluation protocols and metrics. Such an initiative is deemed vital in order to address weaknesses in research methodologies common to the majority of previous work. In the past, both spoofing attacks and countermeasures have generally been developed with full knowledge of a particular ASV system used for vulnerability assessments [2]. Similarly, countermeasures have been developed with full knowledge of the spoofing attack which they are designed to detect. This is clearly unrepresentative of the real use case scenario in which neither the specific attack, much less the specific algorithm, can ever be known a priori. It is thus likely that the prior work has as much over-exaggerated the threat of spoofing as it has the performance of countermeasures. The ASVspoof challenge has been designed to address these shortcomings and to support, for the first time, independent assessments of vulnerabilities to spoofing and of countermeasure performance. While preventing as much as possible the inappropriate use of prior knowledge, the challenge aims to stimulate the development of generalised countermeasures with potential to detect varying and unforeseen spoofing attacks. The first evaluation, ASVspoof 2015, is being held within the scope of a special session at INTERSPEECH 2015 and with a focus on spoofing detection. Expertise in ASV is therefore not a prerequisite to participation in the 2015 edition. ASVspoof 2015 participants are invited to develop spoofing detection algorithms and to submit results for a freely available standard database and according to the standard protocol and metrics described in this evaluation plan.
منابع مشابه
ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge
An increasing number of independent studies have confirmed the vulnerability of automatic speaker verification (ASV) technology to spoofing. However, in comparison to that involving other biometric modalities, spoofing and countermeasure research for ASV is still in its infancy. A current barrier to progress is the lack of standards which impedes the comparison of results generated by different...
متن کاملIntegrated Spoofing Countermeasures and Automatic Speaker Verification: An Evaluation on ASVspoof 2015
It is well known that automatic speaker verification (ASV) systems can be vulnerable to spoofing. The community has responded to the threat by developing dedicated countermeasures aimed at detecting spoofing attacks. Progress in this area has accelerated over recent years, partly as a result of the first standard evaluation, ASVspoof 2015, which focused on spoofing detection in isolation from A...
متن کاملThe ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection
The ASVspoof initiative was created to promote the development of countermeasures which aim to protect automatic speaker verification (ASV) from spoofing attacks. The first community-led, common evaluation held in 2015 focused on countermeasures for speech synthesis and voice conversion spoofing attacks. Arguably, however, it is replay attacks which pose the greatest threat. Such attacks involv...
متن کاملAudio Replay Attack Detection with Deep Learning Frameworks
Nowadays spoofing detection is one of the priority research areas in the field of automatic speaker verification. The success of Automatic Speaker Verification Spoofing and Countermeasures (ASVspoof) Challenge 2015 confirmed the impressive perspective in detection of unforeseen spoofing trials based on speech synthesis and voice conversion techniques. However, there is a small number of researc...
متن کاملAnti-spoofing Methods for Automatic Speaker Verification System
Growing interest in automatic speaker verification (ASV) systems has lead to significant quality improvement of spoofing attacks on them. Many research works confirm that despite the low equal error rate (EER) ASV systems are still vulnerable to spoofing attacks. In this work we overview different acoustic feature spaces and classifiers to determine reliable and robust countermeasures against s...
متن کامل