ISCA Archive Interspeech 2013
ISCA Archive Interspeech 2013

Spoofing and countermeasures for automatic speaker verification

Nicholas Evans, Tomi Kinnunen, Junichi Yamagishi

It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work to develop spoofing countermeasures. The paper concludes with a discussion on the need for standard datasets, metrics and formal evaluations which are needed to assess vulnerabilities to spoofing in realistic scenarios without prior knowledge.

doi: 10.21437/Interspeech.2013-288

Cite as: Evans, N., Kinnunen, T., Yamagishi, J. (2013) Spoofing and countermeasures for automatic speaker verification. Proc. Interspeech 2013, 925-929, doi: 10.21437/Interspeech.2013-288

  author={Nicholas Evans and Tomi Kinnunen and Junichi Yamagishi},
  title={{Spoofing and countermeasures for automatic speaker verification}},
  booktitle={Proc. Interspeech 2013},