Informatics and Automation
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Informatics and Automation:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Informatics and Automation, 2025, Issue 24, volume 1, Pages 193–228
DOI: https://doi.org/10.15622/ia.24.1.8
(Mi trspy1354)
 

Information Security

Speaker-specific method of spoofing attack detection based on anomaly detection

M. Evsyukov

Kuban State Technological University
Abstract: Most research in the field of voice presentation attack detection relies on the speaker-independent approach. Nevertheless, several scientific works indicate that using the speaker-specific approach, which involves utilizing prior knowledge about the identity of the claimed speaker to enhance the accuracy of spoofing detection, is likely to be beneficial. Therefore, the goal of this work is to propose a speaker-specific method of spoofing attack detection based on anomaly detection and to evaluate its applicability to the detection of synthesized speech and converted voice. Artificial neural networks pre-trained for the tasks of spoofing detection, speaker recognition, and audio pattern recognition are used for feature extraction. A set of anomaly detection models are used as backend classifiers. Each of them is trained on bonafide data of a target speaker. The experimental evaluation of the proposed method on the ASVspoof 2019 LA dataset shows that the best speaker-specific spoofing detection system, which uses an anomaly detection model and a neural network pre-trained for the task of speaker recognition, achieves an EER of 4.74%. This result suggests that embeddings extracted by networks pre-trained for speaker recognition contain information that can be utilized for spoofing detection. In addition, the proposed method allowed to increase the accuracy of three baseline systems pre-trained for the task of spoofing detection. Experiments with two baseline systems on the ASVspoof 2019 LA dataset showed relative improvement in terms of EER by 7.1% and 9.2%, and in terms of min t-DCF by 4.6%. Experiments with the third baseline system on the ASVspoof 2021 LA dataset showed relative improvement in terms of EER by 3.9% without significant improvement of min t-DCF.
Keywords: speaker-specific approach, spoofing detection, presentation attack detection, biometric systems, voice biometrics, transfer learning, anomaly detection.
Received: 15.06.2024
Document Type: Article
UDC: 004.056.53
Language: Russian
Citation: M. Evsyukov, “Speaker-specific method of spoofing attack detection based on anomaly detection”, Informatics and Automation, 24:1 (2025), 193–228
Citation in format AMSBIB
\Bibitem{Evs25}
\by M.~Evsyukov
\paper Speaker-specific method of spoofing attack detection based on anomaly detection
\jour Informatics and Automation
\yr 2025
\vol 24
\issue 1
\pages 193--228
\mathnet{http://mi.mathnet.ru/trspy1354}
\crossref{https://doi.org/10.15622/ia.24.1.8}
Linking options:
  • https://www.mathnet.ru/eng/trspy1354
  • https://www.mathnet.ru/eng/trspy/v24/i1/p193
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Informatics and Automation
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2025