16 research outputs found
Synthetic Voice Detection and Audio Splicing Detection using SE-Res2Net-Conformer Architecture
Synthetic voice and splicing audio clips have been generated to spoof
Internet users and artificial intelligence (AI) technologies such as voice
authentication. Existing research work treats spoofing countermeasures as a
binary classification problem: bonafide vs. spoof. This paper extends the
existing Res2Net by involving the recent Conformer block to further exploit the
local patterns on acoustic features. Experimental results on ASVspoof 2019
database show that the proposed SE-Res2Net-Conformer architecture is able to
improve the spoofing countermeasures performance for the logical access
scenario.
In addition, this paper also proposes to re-formulate the existing audio
splicing detection problem. Instead of identifying the complete splicing
segments, it is more useful to detect the boundaries of the spliced segments.
Moreover, a deep learning approach can be used to solve the problem, which is
different from the previous signal processing techniques.Comment: Accepted by the 13th International Symposium on Chinese Spoken
Language Processing (ISCSLP 2022
Uncovering the Deceptions: An Analysis on Audio Spoofing Detection and Future Prospects
Audio has become an increasingly crucial biometric modality due to its
ability to provide an intuitive way for humans to interact with machines. It is
currently being used for a range of applications, including person
authentication to banking to virtual assistants. Research has shown that these
systems are also susceptible to spoofing and attacks. Therefore, protecting
audio processing systems against fraudulent activities, such as identity theft,
financial fraud, and spreading misinformation, is of paramount importance. This
paper reviews the current state-of-the-art techniques for detecting audio
spoofing and discusses the current challenges along with open research
problems. The paper further highlights the importance of considering the
ethical and privacy implications of audio spoofing detection systems. Lastly,
the work aims to accentuate the need for building more robust and generalizable
methods, the integration of automatic speaker verification and countermeasure
systems, and better evaluation protocols.Comment: Accepted in IJCAI 202