Abstract
This chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and concentrate on feature engineering issues. The goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the descriptors that would allow the method to detect attacks performed in an environment entirely different from the training one and with the use of the equipment that differs considerably from the devices that captured the training samples. The final form of the new method performs significantly better than the reference Textrogram algorithm.
Author (1)
Cite as
Full text
full text is not available in portal
Keywords
Details
- Category:
- Monographic publication
- Type:
- rozdział, artykuł w książce - dziele zbiorowym /podręczniku w języku o zasięgu międzynarodowym
- Language:
- English
- Publication year:
- 2022
- Bibliographic description:
- Smiatacz M.: Biometric identity verification// Intelligent interactive systems technologies/ : , 2023, s.53-73
- Sources of funding:
-
- Free publication
- Verified by:
- Gdańsk University of Technology
seen 115 times
Recommended for you
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
- S. S. Narayana Chintapalli,
- S. Prakash Singh,
- J. Frnda
- + 3 authors