Skip to main content

Showing 1–4 of 4 results for author: Chettri, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2103.14602  [pdf, other

    eess.AS cs.CV cs.LG cs.SD

    Data Quality as Predictor of Voice Anti-Spoofing Generalization

    Authors: Bhusan Chettri, Rosa González Hautamäki, Md Sahidullah, Tomi Kinnunen

    Abstract: Voice anti-spoofing aims at classifying a given utterance either as a bonafide human sample, or a spoofing attack (e.g. synthetic or replayed sample). Many anti-spoofing methods have been proposed but most of them fail to generalize across domains (corpora) -- and we do not know \emph{why}. We outline a novel interpretative framework for gauging the impact of data quality upon anti-spoofing perfor… ▽ More

    Submitted 21 June, 2021; v1 submitted 26 March, 2021; originally announced March 2021.

    Comments: INTERSPEECH 2021

  2. arXiv:2010.07913  [pdf, other

    eess.AS cs.SD

    Dataset artefacts in anti-spoofing systems: a case study on the ASVspoof 2017 benchmark

    Authors: Bhusan Chettri, Emmanouil Benetos, Bob L. T. Sturm

    Abstract: The Automatic Speaker Verification Spoofing and Countermeasures Challenges motivate research in protecting speech biometric systems against a variety of different access attacks. The 2017 edition focused on replay spoofing attacks, and involved participants building and training systems on a provided dataset (ASVspoof 2017). More than 60 research papers have so far been published with this dataset… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

    Comments: Accepted to IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2020

  3. arXiv:1904.04589  [pdf, other

    eess.AS cs.SD

    Ensemble Models for Spoofing Detection in Automatic Speaker Verification

    Authors: Bhusan Chettri, Daniel Stoller, Veronica Morfi, Marco A. Martínez Ramírez, Emmanouil Benetos, Bob L. Sturm

    Abstract: Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especially when using only one modeling approach. For robustness, we use both deep neural networks and traditional machine learning models and combine them as ensemble models through logistic regression. They are trained to detect logical access (LA) and physical access (PA) attacks on the dataset released… ▽ More

    Submitted 4 July, 2019; v1 submitted 9 April, 2019; originally announced April 2019.

    Comments: Accepted at Interspeech 2019, Graz, Austria

  4. arXiv:1805.09164  [pdf, other

    eess.AS cs.SD

    A Study On Convolutional Neural Network Based End-To-End Replay Anti-Spoofing

    Authors: Bhusan Chettri, Saumitra Mishra, Bob L. Sturm, Emmanouil Benetos

    Abstract: The second Automatic Speaker Verification Spoofing and Countermeasures challenge (ASVspoof 2017) focused on "replay attack" detection. The best deep-learning systems to compete in ASVspoof 2017 used Convolutional Neural Networks (CNNs) as a feature extractor. In this paper, we study their performance in an end-to-end setting. We find that these architectures show poor generalization in the evaluat… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

    Comments: 6 pages