Abstract
The authenticated users are identified and verified using automatic speaker verification (ASV) technologies. An automatic speaker verification (ASV) system, like any other user identification system, is also sensitive to spoofing. In order to make the ASV systems robust against spoofing, these systems are alienated into two different phases, i.e., frontend feature extraction and backend classification model. The main emphasis of the paper is on the development of the system against multi-order replay attacks. The joint frequency-domain linear prediction (FDLP) and mel-frequency cepstral coefficients (MFCC) is used at frontend to extract the features from the audio samples. At backend, gated recurrent unit (GRU) classification model is used. The proposed system is achieving 2.99% equal error rate (ERR) and 1.6% ERR under 1PR and 2PR spoofing attacks, respectively, and also provides 97.7% and 97.9% accuracy under the same environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mittal A, Dua M (2021) Automatic speaker verification system using three dimensional static and contextual variation-based features with two-dimensional convolutional neural network. Int J Swarm Intell 6(2):143–153
Mittal A, Dua M (2021) Automatic speaker verification systems and spoof detection techniques: review and analysis. Int J Speech Technol 1–30
Lavrentyeva G, Novoselov S, Malykh E, Kozlov A, Kudashev O, Shchemelinin V (2017) Audio replay attack detection with deep learning frameworks. In: Interspeech, pp 82–86
Campbell JP (1995) Testing with the YOHO CD-ROM voice verification corpus. In 1995 international conference on acoustics, speech, and signal processing, vol 1, IEEE, pp 341–344
Mittal A, Dua M (2021) Static–dynamic features and hybrid deep learning models-based spoof detection system for ASV. Complex Intell Syst 1–14
Delgado H et al (2021) ASVspoof 2021: Automatic speaker verification spoofing and countermeasures challenge evaluation plan. arXiv Prepr. arXiv2109.00535
Malik KM, Javed A, Malik H, Irtaza A (2020) A light-weight replay detection framework for voice controlled IoT devices. IEEE J Sel Top Signal Process 14(5):982–996
Dua M, Jain C, Kumar S (2021) LSTM and CNN based ensemble approach for spoof detection task in automatic speaker verification systems. J Ambient Intell Humaniz Comput 1–16
Mittal A, Dua M, Dua S (2021) Classical and deep learning data processing techniques for speech and speaker recognitions. In: Deep learning approaches for spoken and natural language processing. Springer, Cham, pp 111–126
Dua M, Aggarwal RK, Biswas M (2019) GFCC based discriminatively trained noise robust continuous ASR system for Hindi language. J Ambient Intell Humaniz Comput 10(6):2301–2314
Biau G, Scornet E (2016) A random forest guided tour. TEST 25(2):197–227
Mittal A, Dua M (2021) Constant Q cepstral coefficients and long short-term memory model-based automatic speaker verification system. In: Proceedings of international conference on intelligent computing, information and control systems. Springer, Singapore, pp 895–904
Ganapathy S, Pelecanos J, Omar MK (2011) Feature normalization for speaker verification in room reverberation. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 4836–4839
Dua M, Sadhu A, Jindal A, Mehta R (2022) A hybrid noise robust model for multireplay attack detection in automatic speaker verification systems. Biomed Signal Process Control 74:103517
Shukla S, Prakash J, Guntur RS (2019) Replay attack detection with raw audio waves and deep learning framework. In: 2019 international conference on data science and engineering (ICDSE), IEEE, pp 66–70
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Joshi, S., Dua, M. (2023). Multi-order Replay Attack Detection Using Enhanced Feature Extraction and Deep Learning Classification. In: Mahapatra, R.P., Peddoju, S.K., Roy, S., Parwekar, P. (eds) Proceedings of International Conference on Recent Trends in Computing. Lecture Notes in Networks and Systems, vol 600. Springer, Singapore. https://doi.org/10.1007/978-981-19-8825-7_63
Download citation
DOI: https://doi.org/10.1007/978-981-19-8825-7_63
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8824-0
Online ISBN: 978-981-19-8825-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)