Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-asv-antispoofing
This is a curated list of awesome ASV(Automatic Speaker Verification) Anti-Spoofing papers, libraries, datasets, and other resources.
https://github.com/PHJhjpeng1992/awesome-asv-antispoofing
Last synced: 6 days ago
JSON representation
-
Publications
-
Other
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
- Voice Spoofing Detection Corpus for Single and Multi-order Audio Replays
- Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification
- Replay Spoofing Countermeasure Using Autoencoder and Siamese Network on ASVspoof 2019 Challenge
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Data Quality as Predictor of Voice Anti-Spoofing Generalization
- Residual networks for resisting noise: analysis of an embeddings-based spoofing countermeasure
- Detecting Replay Attacks Using Multi-Channel Audio: A Neural Network-Based Method
- An analysis of speaker dependent models in replay detection
- Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
- Dynamically Mitigating Data Discrepancy with Balanced Focal Loss for Replay Attack Detection
- Voice Spoofing Detection Corpus for Single and Multi-order Audio Replays
- An Ensemble Based Approach for Generalized Detection of Spoofing Attacks to Automatic Speaker Recognizers
- Defense against adversarial attacks on spoofing countermeasures of ASV
- Multiple Points Input For Convolutional Neural Networks in Replay Attack Detection
- Auditory Inspired Spatial Differentiation for Replay Spoofing Attack Detection
- Attention-Based LSTM Algorithm for Audio Replay Detection in Noisy Environments
- Cross-domain replay spoofing attack detection using domain adversarial training
- Transmission Line Cochlear Model Based AM-FM Features for Replay Attack Detection
- Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification
- Replay Spoofing Countermeasure Using Autoencoder and Siamese Network on ASVspoof 2019 Challenge
- Independent Modelling of Long and Short Term Speech Information for Replay Detection
- Voice livness detection based on pop-noise detector with phoneme information for speaker verification
- An end-to-end spoofing countermeasure for automatic speaker verificationusing evolving recurrent neural networks
- Deep Siamese Architecture Based Replay Detection for Secure VoiceBiometric
- Use of Claimed Speaker Models for Replay Detection
- Replay Attacks Detection Using Phase and Magnitude Features with Various Frequency Resolutions
- Performance evaluation of front- and back-end techniques for ASV spoofingdetection systems based on deep features
- Modulation Dynamic Features for the Detection of Replay Attacks
- Audio Replay Attack Detection Using High-Frequency Features
- Replay Attack Detection Using DNN for Channel Discrimination
- Investigating the use of Scattering Coefficients for Replay Attack Detection
- Constant Q cepstral coefficients: a spoofing countermeasure for automatic speaker verification
- Anti-spoofing Methods for Automatic Speaker Verification System
- Overview of BTAS 2016 Speaker Anti-spoofing Competition
- Voice Liveness Detection for Speaker Verification based on a Tandem Single/Double-channel Pop Noise Detector
- Cross-Database Evaluation of Audio-Based Spoofing Detection Systems
- Spoofing detection from a feature representationperspective
- Spoofing Speech Detection using Temporal Convolutional Neural Network
- Robust Deep Feature for Spoofing Detection - The SJTU System for ASVspoof 2015 Challenge
- A Comparison of Features for Synthetic Speech Detection
- Anti-spoofing: voice databases
- Vulnerability evaluation of speaker verification under voice conversionspoofing: the effect of text constraints
- Vulnerability In Speaker Verification - A Study Of Technical Impostor Techniques
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- End-to-end anti-spoofing with RawNet2
- Detecting Replay Attacks Using Multi-Channel Audio: A Neural Network-Based Method
- Defense against adversarial attacks on spoofing countermeasures of ASV
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Dynamically Mitigating Data Discrepancy with Balanced Focal Loss for Replay Attack Detection
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
- Anti-spoofing Methods for Automatic Speaker Verification System
-
Special topics
- Replay spoofing detection system for automatic speaker verification using multi-task learning of noise classes
- Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues
- ASVspoof 2017
- BTAS 2016
- ASVspoof 2015
- Advances in anti-spoofing: From the perspective of ASVspoof challenges
- Countermeasures to Replay Attacks: A Review
- Introduction to Voice Presentation Attack Detection and Recent Advances
- An Investigation of Deep-Learning Frameworks for Speaker Verification Anti-spoofing
- Spoofing and countermeasures for speaker verification A survey
- Void: A fast and light voice liveness detection system
- Audio Replay Attack Detection with Deep Learning Frameworks
- Phoneme Specific Modelling and Scoring Techniques for Anti Spoofing System
- The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge
- The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection
- You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones
- Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication
- VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones
- Adversarial Multi-Task Learning for Speaker Normalization in Replay Detection
- Multi-task learning of deep neural networks for joint automatic speaker verification and spoofing detection
- Anti-Spoofing Speaker Verification System with Multi-Feature Integration and Multi-Task Learning
- Replay spoofing detection system for automatic speaker verification using multi-task learning of noise classes
- Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues
- ASVspoof 2021
- ASVspoof 2019
- The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification
- Introduction to Voice Presentation Attack Detection and Recent Advances
- The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge
-
Spoofing attack type
- Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
- CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
- Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
- A11y Attacks: Exploiting Accessibility in Operating Systems
- IEMI Threats for Information Security: Remote Command Injection on Modern Smartphones
- DolphinAttack: Inaudible Voice Commands
- Hidden Voice Commands
- Adversarial Attacks Against Automatic SpeechRecognition Systems via Psychoacoustic Hiding
- CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
- SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems
- Adversarial Music: Real World Audio AdversaryAgainst Wake-word Detection System
- Voice conversion versus speaker verification:an overview
- Evaluation of Speaker Verification Security and Detection of HMM-Based Synthetic Speech
- A study on replay attack and anti-spoofing for text-dependent speaker verification
- A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
- Can a Professional Imitator Fool a GMM-Based Speaker Verification System?
- I-Vectors Meet Imitators: On Vulnerability of Speaker Verification Systems Against Voice Mimicry
- Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
- A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
-
-
Products
-
Video tutorials
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Deep Voice Engine
- IDLive™ Voice
- Voiceprint recognition API
- Voiceprint API,SDK
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
- Voiceprint recognition API
-
-
Software
-
Framework
- MSRidentity Toolbox - us/research/wp-content/uploads/2013/09/MSR-Identity-Toolbox-v1_1.pdf)|
- SIDEKIT - to-end speaker recognition system. |
- kaldi-asr - ci.com/kaldi-asr/kaldi.svg?branch=master)](https://travis-ci.com/kaldi-asr/kaldi) | C++ & Bash | A toolkit for speech & speaker recognition, intended for use by researchers and professionals. |
- Alize LIA_SpkDet
- SPEAR Toolkit (based on BOB) - processing and machine learning toolbox Bob. |
-
Evaluation
-
Clustering
- sklearn.cluster - ci.org/scikit-learn/scikit-learn.svg?branch=master)](https://travis-ci.org/scikit-learn/scikit-learn) | Python | scikit-learn clustering algorithms. |
-
-
Datasets
-
Spoofing datasets
- ASVspoof 2019
- ASVspoof 2017 - [Train(200.7Mb)](https://datashare.ed.ac.uk/bitstream/handle/10283/3055/ASVspoof2017_V2_train.zip?sequence=10&isAllowed=y), [Dev(133.7Mb)](https://datashare.ed.ac.uk/bitstream/handle/10283/3055/ASVspoof2017_V2_dev.zip?sequence=5&isAllowed=y), [Eval(1.065Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/3055/ASVspoof2017_V2_eval.zip?sequence=6&isAllowed=y) | en | Free | [Evaluation Plan](https://datashare.ed.ac.uk/bitstream/handle/10283/3055/asvspoof2017_evalplan_v1.1.pdf?sequence=3&isAllowed=y)
- SAS Corpus - [SS_LARGE-16k (7.591Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_LARGE-16k.tar.gz?sequence=2&isAllowed=y), [SS_LARGE-48k (7.798Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_LARGE-48k.tar.gz?sequence=3&isAllowed=y), [SS_MARY_LARGE (7.303Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_MARY_LARGE.tar.gz?sequence=4&isAllowed=y), [SS_SMALL-16k (7.582Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_SMALL-16k.tar.gz?sequence=5&isAllowed=y), [SS_SMALL-16k (7.582Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_SMALL-16k.tar.gz?sequence=5&isAllowed=y), [SS_SMALL-48k (7.788Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/SS_SMALL-48k.tar.gz?sequence=6&isAllowed=y), [VC_C1 (10.00Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_C1.tar.gz?sequence=7&isAllowed=y), [VC_EVC (6.518Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_EVC.tar.gz?sequence=8&isAllowed=y), [VC_FESTVOX (10.04Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_FESTVOX.tar.gz?sequence=9&isAllowed=y), [VC_FS (10.15Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_FS.tar.gz?sequence=10&isAllowed=y), [VC_GMM (9.830Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_GMM.tar.gz?sequence=11&isAllowed=y), [VC_KPLS (9.703Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_KPLS.tar.gz?sequence=12&isAllowed=y), [VC_LSP (9.616Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_LSP.tar.gz?sequence=13&isAllowed=y), [VC_TVC (6.489Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/VC_TVC.tar.gz?sequence=14&isAllowed=y), [human (3.229Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/782/human.tar.gz?sequence=15&isAllowed=y) | en | Free | [LICENSE](https://datashare.ed.ac.uk/bitstream/handle/10283/782/license_text?sequence=17&isAllowed=y)
- ASVspoof 2015 - [Data - Part aa (7.543Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/853/wav_data.aa.tar.gz?sequence=6&isAllowed=y),[Data - Part ab (7.543Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/853/wav_data.ab.tar.gz?sequence=7&isAllowed=y),[Data - Part ac (7.331Gb)](https://datashare.ed.ac.uk/bitstream/handle/10283/853/wav_data.ac.tar.gz?sequence=8&isAllowed=y) | en | Free | [LICENSE](https://datashare.ed.ac.uk/bitstream/handle/10283/853/license_text?sequence=9&isAllowed=y)
-
Phisical access training sets
-
Logical access training sets
-
Augmentation noise sources
- AudioSet - scale dataset of manually annotated audio events. |
-
Speaker Verification training sets
- TIMIT
- VCTK
- LibriSpeech - scale (1000 hours) corpus of read English speech. |
- LibriVox
- The Spoken Wikipedia Corpora
- BookTubeSpeech - videos where people share their opinions on books - from YouTube. The dataset can be downloaded using [BookTubeSpeech-download](https://github.com/wq2012/BookTubeSpeech-download). |
-
-
Other learning materials
-
Project
-
Video tutorials
-
-
Standards
Categories