Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-asv-antispoofing
This is a curated list of awesome ASV(Automatic Speaker Verification) Anti-Spoofing papers, libraries, datasets, and other resources.
https://github.com/PHJhjpeng1992/awesome-asv-antispoofing
- Advances in anti-spoofing: From the perspective of ASVspoof challenges
- Countermeasures to Replay Attacks: A Review
- Introduction to Voice Presentation Attack Detection and Recent Advances
- An Investigation of Deep-Learning Frameworks for Speaker Verification Anti-spoofing
- Spoofing and countermeasures for speaker verification A survey
- Void: A fast and light voice liveness detection system
- Audio Replay Attack Detection with Deep Learning Frameworks
- Phoneme Specific Modelling and Scoring Techniques for Anti Spoofing System
- The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge
- The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection
- The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification
- You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
- Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication
- VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones
- Adversarial Multi-Task Learning for Speaker Normalization in Replay Detection
- Multi-task learning of deep neural networks for joint automatic speaker verification and spoofing detection
- Anti-Spoofing Speaker Verification System with Multi-Feature Integration and Multi-Task Learning
- Replay spoofing detection system for automatic speaker verification using multi-task learning of noise classes
- Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues
- ASVspoof 2021
- ASVspoof 2019
- ASVspoof 2017
- BTAS 2016
- ASVspoof 2015
- Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
- A11y Attacks: Exploiting Accessibility in Operating Systems
- IEMI Threats for Information Security: Remote Command Injection on Modern Smartphones
- DolphinAttack: Inaudible Voice Commands
- Hidden Voice Commands
- Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
- Adversarial Attacks Against Automatic SpeechRecognition Systems via Psychoacoustic Hiding
- CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
- SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems
- Adversarial Music: Real World Audio AdversaryAgainst Wake-word Detection System
- Voice conversion versus speaker verification:an overview
- Evaluation of Speaker Verification Security and Detection of HMM-Based Synthetic Speech
- A study on replay attack and anti-spoofing for text-dependent speaker verification
- A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
- Can a Professional Imitator Fool a GMM-Based Speaker Verification System?
- I-Vectors Meet Imitators: On Vulnerability of Speaker Verification Systems Against Voice Mimicry
- Data Quality as Predictor of Voice Anti-Spoofing Generalization
- End-to-end anti-spoofing with RawNet2
- Residual networks for resisting noise: analysis of an embeddings-based spoofing countermeasure
- Detecting Replay Attacks Using Multi-Channel Audio: A Neural Network-Based Method
- An analysis of speaker dependent models in replay detection
- Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
- Dynamically Mitigating Data Discrepancy with Balanced Focal Loss for Replay Attack Detection
- Voice Spoofing Detection Corpus for Single and Multi-order Audio Replays
- An Ensemble Based Approach for Generalized Detection of Spoofing Attacks to Automatic Speaker Recognizers
- Defense against adversarial attacks on spoofing countermeasures of ASV
- Multiple Points Input For Convolutional Neural Networks in Replay Attack Detection
- Auditory Inspired Spatial Differentiation for Replay Spoofing Attack Detection
- Attention-Based LSTM Algorithm for Audio Replay Detection in Noisy Environments
- Cross-domain replay spoofing attack detection using domain adversarial training
- Transmission Line Cochlear Model Based AM-FM Features for Replay Attack Detection
- Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification
- Replay Spoofing Countermeasure Using Autoencoder and Siamese Network on ASVspoof 2019 Challenge
- Independent Modelling of Long and Short Term Speech Information for Replay Detection
- Voice livness detection based on pop-noise detector with phoneme information for speaker verification
- An end-to-end spoofing countermeasure for automatic speaker verificationusing evolving recurrent neural networks
- Deep Siamese Architecture Based Replay Detection for Secure VoiceBiometric
- Use of Claimed Speaker Models for Replay Detection
- Replay Attacks Detection Using Phase and Magnitude Features with Various Frequency Resolutions
- Performance evaluation of front- and back-end techniques for ASV spoofingdetection systems based on deep features
- Modulation Dynamic Features for the Detection of Replay Attacks
- Audio Replay Attack Detection Using High-Frequency Features
- Replay Attack Detection Using DNN for Channel Discrimination
- Investigating the use of Scattering Coefficients for Replay Attack Detection
- Constant Q cepstral coefficients: a spoofing countermeasure for automatic speaker verification
- Anti-spoofing Methods for Automatic Speaker Verification System
- Overview of BTAS 2016 Speaker Anti-spoofing Competition
- Voice Liveness Detection for Speaker Verification based on a Tandem Single/Double-channel Pop Noise Detector
- Cross-Database Evaluation of Audio-Based Spoofing Detection Systems
- Spoofing detection from a feature representationperspective
- Spoofing Speech Detection using Temporal Convolutional Neural Network
- Robust Deep Feature for Spoofing Detection - The SJTU System for ASVspoof 2015 Challenge
- A Comparison of Features for Synthetic Speech Detection
- Anti-spoofing: voice databases
- Vulnerability evaluation of speaker verification under voice conversionspoofing: the effect of text constraints
- Vulnerability In Speaker Verification - A Study Of Technical Impostor Techniques
- SpeechBrain - source and all-in-one speech toolkit based on PyTorch. |
- SIDEKIT - to-end speaker recognition system. |
- pyAudioAnalysis
- kaldi-asr - ci.com/kaldi-asr/kaldi.svg?branch=master)](https://travis-ci.com/kaldi-asr/kaldi) | C++ & Bash | A toolkit for speech & speaker recognition, intended for use by researchers and professionals. |
- Alize LIA_SpkDet
- SPEAR Toolkit (based on BOB) - processing and machine learning toolbox Bob. |
- MSRidentity Toolbox - us/research/wp-content/uploads/2013/09/MSR-Identity-Toolbox-v1_1.pdf)|
- t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
- Asvspoof 2021 Evaluation Plan
- sklearn.cluster - ci.org/scikit-learn/scikit-learn.svg?branch=master)](https://travis-ci.org/scikit-learn/scikit-learn) | Python | scikit-learn clustering algorithms. |
- PLDA
- PLDA
- Auto-Tuning Spectral Clustering - Tuning-Spectral-Clustering?style=social) | Python | Auto-tuning Spectral Clustering method that does not need development set or supervised tuning. |
- resemble-ai/Resemblyzer - ai/Resemblyzer?style=social) | d-vector | Python & PyTorch | PyTorch implementation of generalized end-to-end loss for speaker verification, which can be used for voice cloning and diarization. |
- Speaker_Verification - vector | Python & TensorFlow | Tensorflow implementation of generalized end-to-end loss for speaker verification. |
- PyTorch_Speaker_Verification - vector | Python & PyTorch | PyTorch implementation of "Generalized End-to-End Loss for Speaker Verification" by Wan, Li et al. With UIS-RNN integration. |
- Real-Time Voice Cloning - Time-Voice-Cloning?style=social) | d-vector | Python & PyTorch | Implementation of "Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis" (SV2TTS) with a vocoder that works in real-time. |
- deep-speaker - speaker?style=social) | d-vector |Python & Keras | Third party implementation of the Baidu paper Deep Speaker: an End-to-End Neural Speaker Embedding System. |
- x-vector-kaldi-tf - zeinali/x-vector-kaldi-tf?style=social) | x-vector | Python & TensorFlow & Perl | Tensorflow implementation of x-vector topology on top of Kaldi recipe. |
- kaldi-ivector - ivector?style=social) | i-vector | C++ & Perl | Extension to Kaldi implementing the standard i-vector hyperparameter estimation and i-vector extraction procedure. |
- voxceleb-ivector - ivector?style=social) | i-vector |Perl | Voxceleb1 i-vector based speaker recognition system. |
- pytorch_xvectors - vector | Python & PyTorch | PyTorch implementation of Voxceleb x-vectors. Additionaly, includes meta-learning architectures for embedding training. Evaluated with speaker diarization and speaker verification. |
- ASVtorch - vector | Python & PyTorch | ASVtorch is a toolkit for automatic speaker recognition. |
- LibROSA
- python_speech_features - speech-features.readthedocs.io/en/latest/ |
- pyAudioAnalysis
- pyroomacoustics
- gpuRIR
- rir_simulator_python
- Rawnet2 - to-End Neural Anti-spoofing. |
- ReMASC
- Attentive-Filtering-Network - Filtering-Network?style=social) | Python & Bash | University of Edinbrugh-Johns Hopkins University's system for ASVspoof 2017 Version 2.0 dataset. |
- ASVspoof 2019
- ASVspoof 2017 - [Train(200.7Mb)](https://datashare.ed.ac.uk/bitstream/handle/10283/3055/ASVspoof2017_V2_train.zip?sequence=10&isAllowed=y), [Dev(133.7Mb)](https://datashare.ed.ac.uk/bitstream/handle/10283/3055/ASVspoof2017_V2_dev.zip?sequence=5&isAllowed=y), [Eval(1.065Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/3055/ASVspoof2017_V2_eval.zip?sequence=6&isAllowed=y) | en | Free | [Evaluation Plan](https://datashare.ed.ac.uk/bitstream/handle/10283/3055/asvspoof2017_evalplan_v1.1.pdf?sequence=3&isAllowed=y)
- SAS Corpus - [SS_LARGE-16k (7.591Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_LARGE-16k.tar.gz?sequence=2&isAllowed=y), [SS_LARGE-48k (7.798Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_LARGE-48k.tar.gz?sequence=3&isAllowed=y), [SS_MARY_LARGE (7.303Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_MARY_LARGE.tar.gz?sequence=4&isAllowed=y), [SS_SMALL-16k (7.582Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_SMALL-16k.tar.gz?sequence=5&isAllowed=y), [SS_SMALL-16k (7.582Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_SMALL-16k.tar.gz?sequence=5&isAllowed=y), [SS_SMALL-48k (7.788Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_SMALL-48k.tar.gz?sequence=6&isAllowed=y), [VC_C1 (10.00Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_C1.tar.gz?sequence=7&isAllowed=y), [VC_EVC (6.518Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_EVC.tar.gz?sequence=8&isAllowed=y), [VC_FESTVOX (10.04Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_FESTVOX.tar.gz?sequence=9&isAllowed=y), [VC_FS (10.15Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_FS.tar.gz?sequence=10&isAllowed=y), [VC_GMM (9.830Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_GMM.tar.gz?sequence=11&isAllowed=y), [VC_KPLS (9.703Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_KPLS.tar.gz?sequence=12&isAllowed=y), [VC_LSP (9.616Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_LSP.tar.gz?sequence=13&isAllowed=y), [VC_TVC (6.489Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_TVC.tar.gz?sequence=14&isAllowed=y), [human (3.229Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/human.tar.gz?sequence=15&isAllowed=y) | en | Free | [LICENSE](https://datashare.ed.ac.uk/bitstream/handle/10283/782/license_text?sequence=17&isAllowed=y)
- ASVspoof 2015 - [Data - Part aa (7.543Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/853/wav_data.aa.tar.gz?sequence=6&isAllowed=y),[Data - Part ab (7.543Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/853/wav_data.ab.tar.gz?sequence=7&isAllowed=y),[Data - Part ac (7.331Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/853/wav_data.ac.tar.gz?sequence=8&isAllowed=y) | en | Free | [LICENSE](https://datashare.ed.ac.uk/bitstream/handle/10283/853/license_text?sequence=9&isAllowed=y)
- ASV2019 Training set
- ASV2017 Training set
- ASV2019 Training set
- Part aa
- AudioSet - scale dataset of manually annotated audio events. |
- MUSAN
- TIMIT
- VCTK
- LibriSpeech - scale (1000 hours) corpus of read English speech. |
- Multilingual LibriSpeech (MLS) - English, German, Dutch, Spanish, French, Italian, Portuguese, Polish. |
- LibriVox
- VoxCeleb 1&2 - visual dataset consisting of short clips of human speech, extracted from interview videos uploaded to YouTube. |
- The Spoken Wikipedia Corpora
- CN-Celeb
- BookTubeSpeech - videos where people share their opinions on books - from YouTube. The dataset can be downloaded using [BookTubeSpeech-download](https://github.com/wq2012/BookTubeSpeech-download). |
- DeepMine
- NISP-Dataset
- Handbook of Biometric Anti-Spoofing
- Can You Fool Voice Biometrics? - artzi/)
- ID R&D and Synaptics First to Deploy Voice Biometrics on NPU for Smart Home Applications
- Deep Voice Engine
- IDLive™ Voice
- Voiceprint recognition API
- Voiceprint API,SDK
- OCTAVE
- Information security technology — Security requirements of voiceprint recognition data(Exposure draft)
- Technical specifications for voiceprint recognition based security application for mobile finance (JR / t0164-2018)
Keywords
speaker-verification
6
audio
4
pytorch
4
python
4
deep-learning
3
speaker-recognition
3
acoustics
3
image-source-model
2
room-impulse-response
2
speaker-diarization
2
speaker-embeddings
2
speaker-identification
2
signal-processing
2
tensorflow
2
transformers
1
voice-recognition
1
tts
1
voice-cloning
1
deep-speaker
1
keras
1
i-vector
1
kaldi
1
spoken-language-understanding
1
speechrecognition
1
speech-toolkit
1
speech-to-text
1
speech-separation
1
speech-recognition
1
speech-processing
1
speech-enhancement
1
language-model
1
huggingface
1
audio-processing
1
pyaudioanalysis
1
machine-learning
1
audio-data
1
audio-analysis-tasks
1
spoofing-attack
1
replay-attacks
1
automatic-speaker-verification
1
asvspoof
1
anti-spoofing
1
voxceleb2
1
spk-embd
1
rawnet
1
extracted-speaker-embeddings
1
room-impulse-responses
1
rir
1
python-library
1
gpu-acceleration
1