-
Carbon and Boron Nitride nanostructures for Hydrogen storage applications through a theoretical perspective
Authors:
Y. T. Singh,
B. Chettri,
A. Banik,
K. O. Obodo,
D. P. Rai
Abstract:
The recent progress in the field of hydrogen storage in carbon and boron nitride nanostructures has been summarized. Carbon and boron nitride nanostructures are considered advantageous in this prospect due to their lightweight and high surface area. Demerits of pristine structures to hold hydrogen molecules for mobile applications have been highlighted by many researchers. In such cases, weak van…
▽ More
The recent progress in the field of hydrogen storage in carbon and boron nitride nanostructures has been summarized. Carbon and boron nitride nanostructures are considered advantageous in this prospect due to their lightweight and high surface area. Demerits of pristine structures to hold hydrogen molecules for mobile applications have been highlighted by many researchers. In such cases, weak van der Waals interaction comes into account, hence, the hydrogen molecules are weakly bonded with the host materials and hence weak adsorption energy and low hydrogen molecules uptake. So, to tune the adsorption energy as well as overall kinetics, methods such as do**, light alkali-alkaline earth metals decoration, vacancy, functionalization, pressure variation, application of external electric field, and biaxial strain has been adopted by many researchers. Physisorption with atoms decoration is promising for hydrogen storage application. Under this condition, the host materials have high storage capacity with considerable average adsorption energy, feasible adsorption/desorption kinetics.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
Data Quality as Predictor of Voice Anti-Spoofing Generalization
Authors:
Bhusan Chettri,
Rosa González Hautamäki,
Md Sahidullah,
Tomi Kinnunen
Abstract:
Voice anti-spoofing aims at classifying a given utterance either as a bonafide human sample, or a spoofing attack (e.g. synthetic or replayed sample). Many anti-spoofing methods have been proposed but most of them fail to generalize across domains (corpora) -- and we do not know \emph{why}. We outline a novel interpretative framework for gauging the impact of data quality upon anti-spoofing perfor…
▽ More
Voice anti-spoofing aims at classifying a given utterance either as a bonafide human sample, or a spoofing attack (e.g. synthetic or replayed sample). Many anti-spoofing methods have been proposed but most of them fail to generalize across domains (corpora) -- and we do not know \emph{why}. We outline a novel interpretative framework for gauging the impact of data quality upon anti-spoofing performance. Our within- and between-domain experiments pool data from seven public corpora and three anti-spoofing methods based on Gaussian mixture and convolutive neural network models. We assess the impacts of long-term spectral information, speaker population (through x-vector speaker embeddings), signal-to-noise ratio, and selected voice quality features.
△ Less
Submitted 21 June, 2021; v1 submitted 26 March, 2021;
originally announced March 2021.
-
Dataset artefacts in anti-spoofing systems: a case study on the ASVspoof 2017 benchmark
Authors:
Bhusan Chettri,
Emmanouil Benetos,
Bob L. T. Sturm
Abstract:
The Automatic Speaker Verification Spoofing and Countermeasures Challenges motivate research in protecting speech biometric systems against a variety of different access attacks. The 2017 edition focused on replay spoofing attacks, and involved participants building and training systems on a provided dataset (ASVspoof 2017). More than 60 research papers have so far been published with this dataset…
▽ More
The Automatic Speaker Verification Spoofing and Countermeasures Challenges motivate research in protecting speech biometric systems against a variety of different access attacks. The 2017 edition focused on replay spoofing attacks, and involved participants building and training systems on a provided dataset (ASVspoof 2017). More than 60 research papers have so far been published with this dataset, but none have sought to answer why countermeasures appear successful in detecting spoofing attacks. This article shows how artefacts inherent to the dataset may be contributing to the apparent success of published systems. We first inspect the ASVspoof 2017 dataset and summarize various artefacts present in the dataset. Second, we demonstrate how countermeasure models can exploit these artefacts to appear successful in this dataset. Third, for reliable and robust performance estimates on this dataset we propose discarding nonspeech segments and silence before and after the speech utterance during training and inference. We create speech start and endpoint annotations in the dataset and demonstrate how using them helps countermeasure models become less vulnerable from being manipulated using artefacts found in the dataset. Finally, we provide several new benchmark results for both frame-level and utterance-level models that can serve as new baselines on this dataset.
△ Less
Submitted 15 October, 2020;
originally announced October 2020.
-
Subband modeling for spoofing detection in automatic speaker verification
Authors:
Bhusan Chettri,
Tomi Kinnunen,
Emmanouil Benetos
Abstract:
Spectrograms - time-frequency representations of audio signals - have found widespread use in neural network-based spoofing detection. While deep models are trained on the fullband spectrum of the signal, we argue that not all frequency bands are useful for these tasks. In this paper, we systematically investigate the impact of different subbands and their importance on replay spoofing detection o…
▽ More
Spectrograms - time-frequency representations of audio signals - have found widespread use in neural network-based spoofing detection. While deep models are trained on the fullband spectrum of the signal, we argue that not all frequency bands are useful for these tasks. In this paper, we systematically investigate the impact of different subbands and their importance on replay spoofing detection on two benchmark datasets: ASVspoof 2017 v2.0 and ASVspoof 2019 PA. We propose a joint subband modelling framework that employs n different sub-networks to learn subband specific features. These are later combined and passed to a classifier and the whole network weights are updated during training. Our findings on the ASVspoof 2017 dataset suggest that the most discriminative information appears to be in the first and the last 1 kHz frequency bands, and the joint model trained on these two subbands shows the best performance outperforming the baselines by a large margin. However, these findings do not generalise on the ASVspoof 2019 PA dataset. This suggests that the datasets available for training these models do not reflect real world replay conditions suggesting a need for careful design of datasets for training replay spoofing countermeasures.
△ Less
Submitted 4 April, 2020;
originally announced April 2020.
-
Induced Ferromagnetism in bilayer Hexagonal Boron Nitride (h-BN) on vacancy defects at B and N sites
Authors:
B. Chettri,
P. K. Patra,
Tuan V. Vu,
Lalrinkima,
Abu Yaya,
Kingsley O. Obodo,
Ngoc Thanh Thuy Tran,
A. Laref,
D. P. Rai
Abstract:
We investigated the electronic and optical properties of bilayer AB stacked Boron and Nitrogen vacancies in hexagonal Boron Nitride (h-BN) using density functional theory (DFT). The density of states (DOS) and electronic band structure showed that Boron vacancy in bilayer h-BN results in a magnetic and conducting ground state. The band gap energy ranges from 4.56 eV for the pristine BN bilayer to…
▽ More
We investigated the electronic and optical properties of bilayer AB stacked Boron and Nitrogen vacancies in hexagonal Boron Nitride (h-BN) using density functional theory (DFT). The density of states (DOS) and electronic band structure showed that Boron vacancy in bilayer h-BN results in a magnetic and conducting ground state. The band gap energy ranges from 4.56 eV for the pristine BN bilayer to 0.12 eV for a single Nitrogen vacancy in the bilayer. Considering the presence of 1,3,4-Boron vacancy, half metallic character is observed. However, the 2-boron vacancy configuration resulted in metallic character. The bilayers with 1,2,3,4- Nitrogen vacancy has a band gap of 0.39, 0.33, 0.28 and 0.12eV respectively, which is significantly less than the pristine band gap. Also B and N vacancy induces ferromagnetism in the h-BN bilayer. The maximum total magnetic moment for the Boron vacant system is 6.583uB in case of 4-Boron vacancy configuration. In case of Nitrogen vacancy system it is 3.926uB for 4-Nitrogen vacancy configuration. The optical response of the system is presented in terms of the absorption coefficient, refractive index and dielectric constant for pristine as well as the defective configurations. Negative value of dielectric constant for Boron vacant system in the energy range 0.9-1.4 eV and for Nitrogen vacant system in the energy range 0.5-0.8 eV opens an opportunity for it to be utilized for negative index optical materials. The current study shows that B and N vacancies in bilayer h-BN could have potential applications in nano-structure based electronics, optoelectronics and spintronic devices.
△ Less
Submitted 21 March, 2020;
originally announced March 2020.
-
Deep Generative Variational Autoencoding for Replay Spoof Detection in Automatic Speaker Verification
Authors:
Bhusan Chettri,
Tomi Kinnunen,
Emmanouil Benetos
Abstract:
Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also called spoofing attacks. Replay is among the simplest attacks to mount - yet difficult to detect reliably. The generalization failure of spoofing countermeasures (CMs) has driven the community to study various alternative deep learning CMs. The majority of them are supervised approaches that learn a hu…
▽ More
Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also called spoofing attacks. Replay is among the simplest attacks to mount - yet difficult to detect reliably. The generalization failure of spoofing countermeasures (CMs) has driven the community to study various alternative deep learning CMs. The majority of them are supervised approaches that learn a human-spoof discriminator. In this paper, we advocate a different, deep generative approach that leverages from powerful unsupervised manifold learning in classification. The potential benefits include the possibility to sample new data, and to obtain insights to the latent features of genuine and spoofed speech. To this end, we propose to use variational autoencoders (VAEs) as an alternative backend for replay attack detection, via three alternative models that differ in their class-conditioning. The first one, similar to the use of Gaussian mixture models (GMMs) in spoof detection, is to train independently two VAEs - one for each class. The second one is to train a single conditional model (C-VAE) by injecting a one-hot class label vector to the encoder and decoder networks. Our final proposal integrates an auxiliary classifier to guide the learning of the latent space. Our experimental results using constant-Q cepstral coefficient (CQCC) features on the ASVspoof 2017 and 2019 physical access subtask datasets indicate that the C-VAE offers substantial improvement in comparison to training two separate VAEs for each class. On the 2019 dataset, the C-VAE outperforms the VAE and the baseline GMM by an absolute 9 - 10% in both equal error rate (EER) and tandem detection cost function (t-DCF) metrics. Finally, we propose VAE residuals - the absolute difference of the original input and the reconstruction as features for spoofing detection.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
Ensemble Models for Spoofing Detection in Automatic Speaker Verification
Authors:
Bhusan Chettri,
Daniel Stoller,
Veronica Morfi,
Marco A. Martínez Ramírez,
Emmanouil Benetos,
Bob L. Sturm
Abstract:
Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especially when using only one modeling approach. For robustness, we use both deep neural networks and traditional machine learning models and combine them as ensemble models through logistic regression. They are trained to detect logical access (LA) and physical access (PA) attacks on the dataset released…
▽ More
Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especially when using only one modeling approach. For robustness, we use both deep neural networks and traditional machine learning models and combine them as ensemble models through logistic regression. They are trained to detect logical access (LA) and physical access (PA) attacks on the dataset released as part of the ASV Spoofing and Countermeasures Challenge 2019. We propose dataset partitions that ensure different attack types are present during training and validation to improve system robustness. Our ensemble model outperforms all our single models and the baselines from the challenge for both attack types. We investigate why some models on the PA dataset strongly outperform others and find that spoofed recordings in the dataset tend to have longer silences at the end than genuine ones. By removing them, the PA task becomes much more challenging, with the tandem detection cost function (t-DCF) of our best single model rising from 0.1672 to 0.5018 and equal error rate (EER) increasing from 5.98% to 19.8% on the development set.
△ Less
Submitted 4 July, 2019; v1 submitted 9 April, 2019;
originally announced April 2019.
-
A Study On Convolutional Neural Network Based End-To-End Replay Anti-Spoofing
Authors:
Bhusan Chettri,
Saumitra Mishra,
Bob L. Sturm,
Emmanouil Benetos
Abstract:
The second Automatic Speaker Verification Spoofing and Countermeasures challenge (ASVspoof 2017) focused on "replay attack" detection. The best deep-learning systems to compete in ASVspoof 2017 used Convolutional Neural Networks (CNNs) as a feature extractor. In this paper, we study their performance in an end-to-end setting. We find that these architectures show poor generalization in the evaluat…
▽ More
The second Automatic Speaker Verification Spoofing and Countermeasures challenge (ASVspoof 2017) focused on "replay attack" detection. The best deep-learning systems to compete in ASVspoof 2017 used Convolutional Neural Networks (CNNs) as a feature extractor. In this paper, we study their performance in an end-to-end setting. We find that these architectures show poor generalization in the evaluation dataset, but find a compact architecture that shows good generalization on the development data. We demonstrate that for this dataset it is not easy to obtain a similar level of generalization on both the development and evaluation data. This leads to a variety of open questions about what the differences are in the data; why these are more evident in an end-to-end setting; and how these issues can be overcome by increasing the training data.
△ Less
Submitted 22 May, 2018;
originally announced May 2018.