Abstract
Benefiting from advances in speech synthesis and speech conversion technology, artificial speech is so close to natural speech that it is sensory indistinguishable. This situation brings great challenges to the security of voice-based biometric authentication systems. In this work, we propose an end-to-end spoofing detection method which first augments the raw-audio waveform with random channel masking, then feeds it into the lightweight spectral-temporal attention module for cross-dimensional interaction, and finally selects an appropriate attention fusion method to maximise the potential of capturing interactive cues in both spectral and temporal domains. The experimental results show that the proposed method can effectively improve the accuracy of spoof speech detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wu, Z., Evans, N., Kinnunen, T., Yamagishi, J., Alegre, F., Li, H.: Spoofing and countermeasures for speaker verification: a survey. Speech Commun. 66, 130–153 (2015)
Wang, X., Yamagishi, J.: A comparative study on recent neural spoofing countermeasures for synthetic speech detection. In: Annual Conference of the International Speech Communication Association, pp. 4685–4689 (2021)
Ge, W., Patino, J., Todisco, M., Evans, N.: ASVspoof 2021 workshop, pp. 22–28 (2021)
Tak, H., Patino, J., Todisco, M., Nautsch, A., Evans, N., Larcher, A.: End-to-end anti-spoofing with rawnet2. In: 2021 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 6369–6373. IEEE Press (2021)
Park, D. S., et al.: Specaugment: a simple data augmentation method for automatic speech recognition. In: Annual Conference of the International Speech Communication Association, pp. 2613–2617 (2019)
Cohen, A., Rimon, I., Aflalo, E., Permuter, H.: A study on data augmentation in voice anti-spoofing. Speech Commun. 141, 56–67 (2022)
Lai, C.I., Chen, N., Villalba, J., Dehak, N.: ASSERT: Anti-spoofing with squeeze-excitation and residual networks. In: Annual Conference of the International Speech Communication Association, pp. 1013–1017 (2019)
Woo, S., Park, J., Lee, JY., Kweon, I.S.: CBAM: convolutional block attention module. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11211, pp. 3–19. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01234-2_1
Luo, A., Li, E., Liu, Y., Kang, X., Wang, Z.J.: A capsule network based approach for detection of audio spoofing attacks. In: 2021 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 6359–6363. IEEE Press (2021)
Li, X., Wu, X., Lu, H., Liu, X., Meng, H.: Channel-wise gated Res2Net: towards robust detection of synthetic speech attacks. In: Annual Conference of the International Speech Communication Association, pp. 4695–4699 (2021)
Zhang, Y., Jiang, F., Duan, Z.: One-class learning towards synthetic voice spoofing detection. IEEE Signal Proc. Let. 28, 937–941 (2021)
Li, X., et al.: Replay and synthetic speech detection with res2net architecture. In: 2021 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 6354–6358. IEEE Press (2021)
Lei, Z., Yang, Y., Liu, C., Ye, J.: Siamese convolutional neural network using gaussian probability feature for spoofing speech detection. In: Annual Conference of the International Speech Communication Association, pp. 1116–1120 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, Y., Zhang, J., Zhang, P. (2022). Spoof Speech Detection Based on Raw Cross-Dimension Interaction Attention Network. In: Deng, W., et al. Biometric Recognition. CCBR 2022. Lecture Notes in Computer Science, vol 13628. Springer, Cham. https://doi.org/10.1007/978-3-031-20233-9_63
Download citation
DOI: https://doi.org/10.1007/978-3-031-20233-9_63
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20232-2
Online ISBN: 978-3-031-20233-9
eBook Packages: Computer ScienceComputer Science (R0)