ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1911.01601
58
12
v1v2v3v4 (latest)

ASVspoof 2019: a large-scale public database of synthetic, converted and replayed speech

5 November 2019
Xin Wang
Junichi Yamagishi
Massimiliano Todisco
Héctor Delgado
A. Nautsch
Nicholas W. D. Evans
Md. Sahidullah
Ville Vestman
Tomi Kinnunen
Kong Aik Lee
Lauri Juvela
P. Alku
Yu-Huai Peng
Hsin-Te Hwang
Yu Tsao
Hsin-Min Wang
Sébastien Le Maguer
Markus Becker
Fergus Henderson
R. Clark
Yu Zhang
Quan Wang
Ye Jia
Kai Onuma
Koji Mushika
Takashi Kaneda
Yuan Jiang
Li-Juan Liu
Yi-Chiao Wu
Wen-Chin Huang
Tomoki Toda
Kou Tanaka
Hirokazu Kameoka
I. Steiner
D. Matrouf
J. Bonastre
Avashna Govender
S. Ronanki
Jing-Xuan Zhang
Zhenhua Ling
ArXiv (abs)PDFHTML
Abstract

Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric person recognition. Unfortunately, just like all other biometric systems, ASV is vulnerable to spoofing, also referred to as "presentation attacks." These vulnerabilities are generally unacceptable and call for spoofing countermeasures or "presentation attack detection" systems. In addition to impersonation, ASV systems are vulnerable to replay, speech synthesis, and voice conversion attacks. The ASVspoof 2019 edition is the first to consider all three spoofing attack types within a single challenge. While they originate from the same source database and same underlying protocol, they are explored in two specific use case scenarios. Spoofing attacks within a logical access (LA) scenario are generated with the latest speech synthesis and voice conversion technologies, including state-of-the-art neural acoustic and waveform model techniques. Replay spoofing attacks within a physical access (PA) scenario are generated through carefully controlled simulations that support much more revealing analysis than possible previously. Also new to the 2019 edition is the use of the tandem detection cost function metric, which reflects the impact of spoofing and countermeasures on the reliability of a fixed ASV system. This paper describes the database design, protocol, spoofing attack implementations, and baseline ASV and countermeasure results. It also describes a human assessment on spoofed data in logical access. It was demonstrated that the spoofing data in the ASVspoof 2019 database have varied degrees of perceived quality and similarity to the target speakers, including spoofed data that cannot be differentiated from bona-fide utterances even by human subjects.

View on arXiv
Comments on this paper