Back to Search
Start Over
Spoofing and countermeasures for speaker verification: A survey
- Source :
- Speech Communication. 66:130-153
- Publication Year :
- 2015
- Publisher :
- Elsevier BV, 2015.
-
Abstract
- While biometric authentication has advanced significantly in recent years, evidence shows the technology can be susceptible to malicious spoofing attacks. The research community has responded with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; biometric systems remain vulnerable to spoofing. Despite a growing momentum to develop spoofing countermeasures for automatic speaker verification, now that the technology has matured sufficiently to support mass deployment in an array of diverse applications, greater effort will be needed in the future to ensure adequate protection against spoofing. This article provides a survey of past work and identifies priority research directions for the future. We summarise previous studies involving impersonation, replay, speech synthesis and voice conversion spoofing attacks and more recent efforts to develop dedicated countermeasures. The survey shows that future research should address the lack of standard datasets and the over-fitting of existing countermeasures to specific, known spoofing attacks.
- Subjects :
- Linguistics and Language
Spoofing attack
Speaker verification
Biometrics
Computer science
Communication
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
Speech synthesis
computer.software_genre
Computer security
Language and Linguistics
IP address spoofing
Computer Science Applications
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
Countermeasure
Software deployment
Modeling and Simulation
Research community
Computer Vision and Pattern Recognition
computer
Software
Subjects
Details
- ISSN :
- 01676393
- Volume :
- 66
- Database :
- OpenAIRE
- Journal :
- Speech Communication
- Accession number :
- edsair.doi...........3840a4af47fee637db56fad1fd65c99f
- Full Text :
- https://doi.org/10.1016/j.specom.2014.10.005