A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction

Choon, Beng Tan and Mohd Hanafi Ahmad Hijazi and Norazlina Khamis and Puteri Nor Ellyza binti Nohuddin and Zuraini Zainol and Frans Coenen and Abdullah Gani (2021) A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction. Multimedia Tools and Applications, 80. pp. 32725-32762. ISSN 1380-7501

[img] Text
A survey on presentation attack detection for automatic speaker verification systems.pdf

Download (40kB)
[img] Text
A survey on presentation attack detection for automatic speaker verification systems1.pdf
Restricted to Registered users only

Download (2MB) | Request a copy

Abstract

The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established.

Item Type: Article
Keyword: Speaker identification , Speaker verification , Anti-spoofing voice recognition , Voice presentation attack detection , Voice PAD
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK1-9971 Electrical engineering. Electronics. Nuclear engineering > TK7800-8360 Electronics > TK7885-7895 Computer engineering. Computer hardware
Department: FACULTY > Faculty of Computing and Informatics
Depositing User: SITI AZIZAH BINTI IDRIS -
Date Deposited: 01 Mar 2022 15:58
Last Modified: 01 Mar 2022 15:58
URI: https://eprints.ums.edu.my/id/eprint/31798

Actions (login required)

View Item View Item