Detail publikačního výsledku

Detecting Spoofing Attacks Using VGG and SincNet: BUT-Omilia Submission to ASVspoof 2019 Challenge

ZEINALI, H.; STAFYLAKIS, T.; ATHANASOPOULOU, G.; ROHDIN, J.; GKINIS, I.; BURGET, L.; ČERNOCKÝ, J.

Originální název

Detecting Spoofing Attacks Using VGG and SincNet: BUT-Omilia Submission to ASVspoof 2019 Challenge

Anglický název

Detecting Spoofing Attacks Using VGG and SincNet: BUT-Omilia Submission to ASVspoof 2019 Challenge

Druh

Stať ve sborníku v databázi WoS či Scopus

Originální abstrakt

In this paper, we present the system description of the joint effortsof Brno University of Technology (BUT) and Omilia -Conversational Intelligence for the ASVSpoof2019 Spoofingand Countermeasures Challenge. The primary submission forPhysical access (PA) is a fusion of two VGG networks, trainedon single and two-channels features. For Logical access (LA),our primary system is a fusion of VGG and the recently introducedSincNet architecture. The results on PA show thatthe proposed networks yield very competitive performance inall conditions and achieved 86 % relative improvement comparedto the official baseline. On the other hand, the results onLA showed that although the proposed architecture and trainingstrategy performs very well on certain spoofing attacks, it failsto generalize to certain attacks that are unseen during training.

Anglický abstrakt

In this paper, we present the system description of the joint effortsof Brno University of Technology (BUT) and Omilia -Conversational Intelligence for the ASVSpoof2019 Spoofingand Countermeasures Challenge. The primary submission forPhysical access (PA) is a fusion of two VGG networks, trainedon single and two-channels features. For Logical access (LA),our primary system is a fusion of VGG and the recently introducedSincNet architecture. The results on PA show thatthe proposed networks yield very competitive performance inall conditions and achieved 86 % relative improvement comparedto the official baseline. On the other hand, the results onLA showed that although the proposed architecture and trainingstrategy performs very well on certain spoofing attacks, it failsto generalize to certain attacks that are unseen during training.

Klíčová slova

detecting. spoofing, challenge, AVSSpoof

Klíčová slova v angličtině

detecting. spoofing, challenge, AVSSpoof

Autoři

ZEINALI, H.; STAFYLAKIS, T.; ATHANASOPOULOU, G.; ROHDIN, J.; GKINIS, I.; BURGET, L.; ČERNOCKÝ, J.

Rok RIV

2020

Vydáno

15.09.2019

Nakladatel

International Speech Communication Association

Místo

Graz

Kniha

Proceedings of Interspeech

ISSN

1990-9772

Periodikum

Proceedings of Interspeech

Svazek

2019

Číslo

9

Stát

Francouzská republika

Strany od

1073

Strany do

1077

Strany počet

5

URL

BibTex

@inproceedings{BUT159993,
  author="ZEINALI, H. and STAFYLAKIS, T. and ATHANASOPOULOU, G. and ROHDIN, J. and GKINIS, I. and BURGET, L. and ČERNOCKÝ, J.",
  title="Detecting Spoofing Attacks Using VGG and SincNet: BUT-Omilia Submission to ASVspoof 2019 Challenge",
  booktitle="Proceedings of Interspeech",
  year="2019",
  journal="Proceedings of Interspeech",
  volume="2019",
  number="9",
  pages="1073--1077",
  publisher="International Speech Communication Association",
  address="Graz",
  doi="10.21437/Interspeech.2019-2892",
  issn="1990-9772",
  url="https://www.isca-speech.org/archive/Interspeech_2019/pdfs/2892.pdf"
}

Dokumenty