Integrated Replay Spoofing-Aware Text-Independent Speaker Verification

A number of studies have successfully developed speaker verification or presentation attack detection systems. However, studies integrating the two tasks remain in the preliminary stages. In this paper, we propose two approaches for building an integrated system of speaker verification and presentat...

Full description

Bibliographic Details
Main Authors: Hye-jin Shim, Jee-weon Jung, Ju-ho Kim, Ha-jin Yu
Format: Article
Language:English
Published: MDPI AG 2020-09-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/10/18/6292
_version_ 1797554073446121472
author Hye-jin Shim
Jee-weon Jung
Ju-ho Kim
Ha-jin Yu
author_facet Hye-jin Shim
Jee-weon Jung
Ju-ho Kim
Ha-jin Yu
author_sort Hye-jin Shim
collection DOAJ
description A number of studies have successfully developed speaker verification or presentation attack detection systems. However, studies integrating the two tasks remain in the preliminary stages. In this paper, we propose two approaches for building an integrated system of speaker verification and presentation attack detection: an end-to-end monolithic approach and a back-end modular approach. The first approach simultaneously trains speaker identification, presentation attack detection, and the integrated system using multi-task learning using a common feature. However, through experiments, we hypothesize that the information required for performing speaker verification and presentation attack detection might differ because speaker verification systems try to remove device-specific information from speaker embeddings, while presentation attack detection systems exploit such information. Therefore, we propose a back-end modular approach using a separate deep neural network (DNN) for speaker verification and presentation attack detection. This approach has thee input components: two speaker embeddings (for enrollment and test each) and prediction of presentation attacks. Experiments are conducted using the ASVspoof 2017-v2 dataset, which includes official trials on the integration of speaker verification and presentation attack detection. The proposed back-end approach demonstrates a relative improvement of 21.77% in terms of the equal error rate for integrated trials compared to a conventional speaker verification system.
first_indexed 2024-03-10T16:26:39Z
format Article
id doaj.art-96d0080f1d434fec8a5e8af52d0ca5f6
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-10T16:26:39Z
publishDate 2020-09-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-96d0080f1d434fec8a5e8af52d0ca5f62023-11-20T13:13:18ZengMDPI AGApplied Sciences2076-34172020-09-011018629210.3390/app10186292Integrated Replay Spoofing-Aware Text-Independent Speaker VerificationHye-jin Shim0Jee-weon Jung1Ju-ho Kim2Ha-jin Yu3School of Computer Science, University of Seoul, Seoul 02504, KoreaSchool of Computer Science, University of Seoul, Seoul 02504, KoreaSchool of Computer Science, University of Seoul, Seoul 02504, KoreaSchool of Computer Science, University of Seoul, Seoul 02504, KoreaA number of studies have successfully developed speaker verification or presentation attack detection systems. However, studies integrating the two tasks remain in the preliminary stages. In this paper, we propose two approaches for building an integrated system of speaker verification and presentation attack detection: an end-to-end monolithic approach and a back-end modular approach. The first approach simultaneously trains speaker identification, presentation attack detection, and the integrated system using multi-task learning using a common feature. However, through experiments, we hypothesize that the information required for performing speaker verification and presentation attack detection might differ because speaker verification systems try to remove device-specific information from speaker embeddings, while presentation attack detection systems exploit such information. Therefore, we propose a back-end modular approach using a separate deep neural network (DNN) for speaker verification and presentation attack detection. This approach has thee input components: two speaker embeddings (for enrollment and test each) and prediction of presentation attacks. Experiments are conducted using the ASVspoof 2017-v2 dataset, which includes official trials on the integration of speaker verification and presentation attack detection. The proposed back-end approach demonstrates a relative improvement of 21.77% in terms of the equal error rate for integrated trials compared to a conventional speaker verification system.https://www.mdpi.com/2076-3417/10/18/6292speaker verificationpresentation attack detectiondeep neural networks
spellingShingle Hye-jin Shim
Jee-weon Jung
Ju-ho Kim
Ha-jin Yu
Integrated Replay Spoofing-Aware Text-Independent Speaker Verification
Applied Sciences
speaker verification
presentation attack detection
deep neural networks
title Integrated Replay Spoofing-Aware Text-Independent Speaker Verification
title_full Integrated Replay Spoofing-Aware Text-Independent Speaker Verification
title_fullStr Integrated Replay Spoofing-Aware Text-Independent Speaker Verification
title_full_unstemmed Integrated Replay Spoofing-Aware Text-Independent Speaker Verification
title_short Integrated Replay Spoofing-Aware Text-Independent Speaker Verification
title_sort integrated replay spoofing aware text independent speaker verification
topic speaker verification
presentation attack detection
deep neural networks
url https://www.mdpi.com/2076-3417/10/18/6292
work_keys_str_mv AT hyejinshim integratedreplayspoofingawaretextindependentspeakerverification
AT jeeweonjung integratedreplayspoofingawaretextindependentspeakerverification
AT juhokim integratedreplayspoofingawaretextindependentspeakerverification
AT hajinyu integratedreplayspoofingawaretextindependentspeakerverification