Spoof Detection for Automatic Speaker Verification
Project Introduction
The human voice is one of the biometric indicators representing a person's identity. It has been successfully used in automatic speaker verification (ASV) systems in many applications, e.g., mobile banking and call centers in the financial sector and some access control in the industrial sector. The global growth of the voice biometrics market is projected to expand from 1.1 billion USD in 2020 to 3.9 billion USD by 2026. Among applications using each type of biometrics (e.g., fingerprint, face, iris, palm and vein, and heartbeat), the voice proportion is about 15 percent. It is used primarily in technology and financial domains. At the same time, ASV systems are currently vulnerable to spoofing attacks in which someone disguises themselves as another and illegitimately accesses a secure system. Hence, countermeasures against spoofing attacks are necessary to verify whether the claimed voice is a genuine or fake representation before verifying or identifying the speaker’s identity. Attackers might merely replay someone’s voice, called replay attacks. Other spoofing attacks, e.g., speech synthesis and voice conversion, can be done easily using tools or advanced technology without prior knowledge. Therefore, this research focuses on spoofing detection in automatic speaker verification.
The objectives of this project are listed as follows:
The objectives of this project are listed as follows:
- To explore and investigate significant of speech features for spoof detection,
- To optimize percentage of voice and non-voice segments in features used in spoofing detection,
- To investigate pathological feature for spoof detection,
- To minimize detection error,
- To improve an accuracy of ASV, and
- To study multi-lingual spoof detection.
Project Members
* Project Leader
Project Members | |
---|---|
Full Name | Department, Institution, Country |
Kasorn Galajit * | National Electronics and Computer Technology Center, Thailand |
Jessada Karnjana | National Electronics and Computer Technology Center, Thailand |
Surasak Boonkla | National Electronics and Computer Technology Center, Thailand |
Masashi Unoki | Japan Advanced Institute of Science and Technology, Japan |
Candy Olivia Mawalim | Japan Advanced Institute of Science and Technology, Japan |
Kai Li | Japan Advanced Institute of Science and Technology, Japan |
Anuwat Chaiwongyen | Japan Advanced Institute of Science and Technology, Japan |
Khalid Zaman | Japan Advanced Institute of Science and Technology, Japan |
Aulia Adila | Japan Advanced Institute of Science and Technology, Japan |
Nopparut Li | Japan Advanced Institute of Science and Technology, Japan |
Waree Kongprawechnon | Sirindhorn International Institute of Technology, Thailand |
Pakinee Aimmanee | Sirindhorn International Institute of Technology, Thailand |
Khaing Mon | Sirindhorn International Institute of Technology, Thailand |
Anunda Mills | Sirindhorn International Institute of Technology, Thailand |
Pannathorn Sathirasattayanon | Sirindhorn International Institute of Technology, Thailand |
Patthranit Kaewcharuay | Sirindhorn International Institute of Technology, Thailand |
Nanthayod Termkoh | Sirindhorn International Institute of Technology, Thailand |
Sasiporn Usanavain | Sirindhorn International Institute of Technology, Thailand |
Kosin Kalarat | Sirindhorn International Institute of Technology, Thailand |
Suradej Duangpummet | National Electronics and Computer Technology Center, Thailand |
Win Pa | University of Computer Studies, Yangon, Myanmar |
Win Lai Lai Phyu | University of Computer Studies, Yangon, Myanmar |
Myat Aye Aye Aung | University of Computer Studies, Yangon, Myanmar |
Hay Mar Soe Naing | University of Computer Studies, Yangon, Myanmar |
Aye Mya Hlaing | University of Computer Studies, Yangon, Myanmar |
Xugang Lu | The National Institute of Information and Communications Technology, Japan |
Sheng Li | The National Institute of Information and Communications Technology, Japan |
Hayati Pg Hj Yassin | Universiti Brunei Darussalam , Brunei |
Navod Neranjan Thilakarathne | Universiti Brunei Darussalam , Brunei |
Dessi Puji Lestari | Institut Teknologi Bandung (Bandung Institute of Technology), Indonesia |
Sarah Azka Arief | Institut Teknologi Bandung (Bandung Institute of Technology), Indonesia |
- Project Introduction[PDF 234KB]
- 2023 progress report[PDF 524KB]
- Kick-off meeting report[PDF 3.02MB]
- Conference Presentation Report - M3Oriental: Workshop of Multimodal, Multilingual and Multitask Modeling Technologies for Oriental Languages[Word 325KB]
- Conference Presentation Report - The 18th International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP 2023) I (word)
- Conference Presentation Report - The 18th International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP 2023) II (word)
- Conference Presentation Report - The 26th Conference of the Oriental COCOSDA (word)
- OCOCOSDA 2023 Program Sessions[PDF 381KB]
- Speech Watermarking for Tampering Detection Using SSA with a Psychoacoustic Model[PDF 1.82MB]
- Meeting report[PDF 1.61MB]
- Contributions of jitter and shimmer in the voice for fake audio detection[PDF 1.40MB]
- Speech detection with pathological features and multiplayer perceptron neural network[PDF 778KB]
- ThaiSpoof: a database for spoof detection in Thai language[PDF 632KB]
- 5th International conference on Industrial Engineering and Artificial Intelligence (IEAI) 2024 Report[PDF 297KB]
- IEAI 2024 presentation[PPT/pptx 530KB]
- Exploring a Cutting-Edge Convolutional Neural Network for Speech Emotion Recognition[PDF 516KB]