• English
    • suomi
  • English 
    • English
    • suomi
  • Login
View Item 
  •   Home
  • Artikkelit
  • Luonnontieteiden ja metsätieteiden tiedekunta
  • View Item
  •   Home
  • Artikkelit
  • Luonnontieteiden ja metsätieteiden tiedekunta
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Introduction to voice presentation attack detection and recent advances

Thumbnail
View/Open
Item embargoed until 2021-01-01. Restrictions imposed by the publisher
Self archived version
final draft
Date
2019
Author
Sahidullah, Md
Delgado, Hector
Todisco, Massimiliano
Kinnunen, Tomi
Evans, Nicholas
Yamagishi, Junichi
Lee, Kong-Aik
Unique identifier
10.1007/978-3-319-92627-8_15
Metadata
Show full item record
More information
Research Database SoleCris

Self-archived article

Citation
Sahidullah, Md. Delgado, Hector. Todisco, Massimiliano. Kinnunen, Tomi. Evans, Nicholas. Yamagishi, Junichi. Lee, Kong-Aik. (2019). Introduction to voice presentation attack detection and recent advances.  Handbook of Biometric Anti-Spoofing : presentation attack detection, 321-361. 10.1007/978-3-319-92627-8_15.
Rights
© Springer Nature Switzerland AG
Licensed under
All rights reserved
Abstract

Over the past few years significant progress has been made in the field of presentation attack detection (PAD) for automatic speaker recognition (ASV). This includes the development of new speech corpora, standard evaluation protocols and advancements in front-end feature extraction and back-end classifiers. The use of standard databases and evaluation protocols has enabled for the first time the meaningful benchmarking of different PAD solutions. This chapter summarises the progress, with a focus on studies completed in the last three years. The article presents a summary of findings and lessons learned from two ASVspoof challenges, the first community-led benchmarking efforts. These show that ASV PAD remains an unsolved problem and that further attention is required to develop generalised PAD solutions which have potential to detect diverse and previously unseen spoofing attacks.

URI
https://erepo.uef.fi/handle/123456789/7245
Link to the original item
http://dx.doi.org/10.1007/978-3-319-92627-8_15
Publisher
Springer International Publishing
Collections
  • Luonnontieteiden ja metsätieteiden tiedekunta
University of Eastern Finland
OpenAccess
eRepo
erepo@uef.fi
Send Feedback
OpenUEF
Service provided by
the University of Eastern Finland Library
Library web pages
Twitter
Facebook
Youtube
Library blog
 

Browse

All of the ArchiveResource types & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login
University of Eastern Finland
OpenAccess
eRepo
erepo@uef.fi
Send Feedback
OpenUEF
Service provided by
the University of Eastern Finland Library
Library web pages
Twitter
Facebook
Youtube
Library blog