Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification
•Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable spectro-temporal resolution key to detection performance.•State-of-the-art performance across three standard databases.•Cross-database resul...
Saved in:
Published in | Computer speech & language Vol. 45; pp. 516 - 535 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.09.2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | •Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable spectro-temporal resolution key to detection performance.•State-of-the-art performance across three standard databases.•Cross-database results point towards new approach for generalisation.
Recent evaluations such as ASVspoof 2015 and the similarly-named AVspoof have stimulated a great deal of progress to develop spoofing countermeasures for automatic speaker verification. This paper reports an approach which combines speech signal analysis using the constant Q transform with traditional cepstral processing. The resulting constant Q cepstral coefficients (CQCCs) were introduced recently and have proven to be an effective spoofing countermeasure. An extension of previous work, the paper reports an assessment of CQCCs generalisation across three different databases and shows that they deliver state-of-the-art performance in each case. The benefit of CQCC features stems from a variable spectro-temporal resolution which, while being fundamentally different to that used by most automatic speaker verification system front-ends, also captures reliably the tell-tale signs of manipulation artefacts which are indicative of spoofing attacks. The second contribution relates to a cross-database evaluation. Results show that CQCC configuration is sensitive to the general form of spoofing attack and use case scenario. This finding suggests that the past single-system pursuit of generalised spoofing detection may need rethinking. |
---|---|
ISSN: | 0885-2308 1095-8363 |
DOI: | 10.1016/j.csl.2017.01.001 |