Features and Classifiers for Replay Spoofing Attack Detection
dc.authorid | 0000-0002-9174-0367 | en_US |
dc.contributor.author | Hanilçi, Cemal | |
dc.date.accessioned | 2021-03-20T20:14:02Z | |
dc.date.available | 2021-03-20T20:14:02Z | |
dc.date.issued | 2017 | |
dc.department | BTÜ, Mühendislik ve Doğa Bilimleri Fakültesi, Elektrik Elektronik Mühendisliği Bölümü | en_US |
dc.description | 10th International Conference on Electrical and Electronics Engineering (ELECO) -- NOV 30-DEC 02, 2017 -- Bursa, TURKEY | en_US |
dc.description.abstract | Automatic speaker verification (ASV) systems are known to be highly vulnerable against spoofing attacks. Various successful countermeasures have recently been proposed to detect spoofing attacks originating from speech synthesis (SS) and voice conversion (VC). However, detecting replay attacks, the most easily implementable spoofing attacks against ASV systems, has gained less attention. Thus, in this paper we present an experimental comparison of various feature extraction techniques and classifiers for replay attack detection. In total, six magnitude spectrum and three phase spectrum based features are used for feature extraction. For classification in turn, four different techniques are utilized. Experiments are conducted on recently released ASVspoof 2017 replay attack detection challenge. Experimental results reveals that magnitude spectrum features considerably outperform phase based features independent of the classifier. Comparative results using four different classifiers indicate that i-vector cosine scoring yields lower equal error rates (EERs) than other methods. | en_US |
dc.description.sponsorship | Chamber Elect Engineers Bursa Branch, Uludag Univ, Fac Engn, Dept Elect & Elect Engn, Istanbul Tech Univ, Fac Elect & Elect Engn, Sci & Technolog Res Council Turkey, IEEE Turkey Sect | en_US |
dc.description.sponsorship | Bursa Technical UniversityBursa Technical University [2016-01-012] | en_US |
dc.description.sponsorship | This work was supported by the Bursa Technical University under project no. 2016-01-012 | en_US |
dc.identifier.endpage | 1191 | en_US |
dc.identifier.isbn | 978-1-5386-1723-6 | |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.startpage | 1187 | en_US |
dc.identifier.uri | https://hdl.handle.net/20.500.12885/983 | |
dc.identifier.wos | WOS:000426978800209 | en_US |
dc.identifier.wosquality | N/A | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.institutionauthor | Hanilçi, Cemal | |
dc.language.iso | en | en_US |
dc.publisher | Ieee | en_US |
dc.relation.ispartof | 2017 10Th International Conference On Electrical And Electronics Engineering (Eleco) | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | [No Keywords] | en_US |
dc.title | Features and Classifiers for Replay Spoofing Attack Detection | en_US |
dc.type | Conference Object | en_US |