Loading…
A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction
The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification...
Saved in:
Published in: | Multimedia tools and applications 2021-09, Vol.80 (21-23), p.32725-32762 |
---|---|
Main Authors: | , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3 |
---|---|
cites | cdi_FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3 |
container_end_page | 32762 |
container_issue | 21-23 |
container_start_page | 32725 |
container_title | Multimedia tools and applications |
container_volume | 80 |
creator | Tan, Choon Beng Hijazi, Mohd Hanafi Ahmad Khamis, Norazlina Nohuddin, Puteri Nor Ellyza binti Zainol, Zuraini Coenen, Frans Gani, Abdullah |
description | The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. |
doi_str_mv | 10.1007/s11042-021-11235-x |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2580190300</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2580190300</sourcerecordid><originalsourceid>FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3</originalsourceid><addsrcrecordid>eNp9UMlOwzAQjRBIlMIPcLLEtYaxncQJt6pikypxoHfLScaQlsbFdlDzEfwzpkHixmm2t4xeklwyuGYA8sYzBimnwBlljIuM7o-SCcukoFJydhx7UQCVGbDT5Mz7NQDLM55Okq858b37xIHYjuwceuyCDm0cdAi63pAGA9aHhbGO6D7YbbzXxO9Qb9CRT3StaeuR4wcfcOtvyUsUQWoNDW9ItQszEvTednY7zEjrfY-e6K4hpg-9Q9K0bvQ4T06Mfvd48Vunyer-brV4pMvnh6fFfElrkYtATcZlw7JK1E1toCpTKGVq8hxyXgoELbWEAgsQrJBlzKSqjC6NMMCLopQopsnVKLtz9iP-EtTa9q6LjopnBbASBEBE8RFVO-u9Q6N2rt1qNygG6id1NaauooM6pK72kSRGko_g7hXdn_Q_rG96VYga</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2580190300</pqid></control><display><type>article</type><title>A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction</title><source>ABI/INFORM Global</source><source>Springer Nature</source><creator>Tan, Choon Beng ; Hijazi, Mohd Hanafi Ahmad ; Khamis, Norazlina ; Nohuddin, Puteri Nor Ellyza binti ; Zainol, Zuraini ; Coenen, Frans ; Gani, Abdullah</creator><creatorcontrib>Tan, Choon Beng ; Hijazi, Mohd Hanafi Ahmad ; Khamis, Norazlina ; Nohuddin, Puteri Nor Ellyza binti ; Zainol, Zuraini ; Coenen, Frans ; Gani, Abdullah</creatorcontrib><description>The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-021-11235-x</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Biometrics ; Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Multimedia Information Systems ; Special Purpose and Application-Based Systems ; Spoofing ; Taxonomy ; Trend analysis ; Verification ; Voice</subject><ispartof>Multimedia tools and applications, 2021-09, Vol.80 (21-23), p.32725-32762</ispartof><rights>The Author(s) 2021</rights><rights>The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3</citedby><cites>FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3</cites><orcidid>0000-0002-7204-7305 ; 0000-0003-1078-8885 ; 0000-0002-4388-020X ; 0000-0003-0627-5630 ; 0000-0003-1026-6649 ; 0000-0003-0431-8967 ; 0000-0002-6881-7039</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2580190300/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2580190300?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,11687,27923,27924,36059,44362,74766</link.rule.ids></links><search><creatorcontrib>Tan, Choon Beng</creatorcontrib><creatorcontrib>Hijazi, Mohd Hanafi Ahmad</creatorcontrib><creatorcontrib>Khamis, Norazlina</creatorcontrib><creatorcontrib>Nohuddin, Puteri Nor Ellyza binti</creatorcontrib><creatorcontrib>Zainol, Zuraini</creatorcontrib><creatorcontrib>Coenen, Frans</creatorcontrib><creatorcontrib>Gani, Abdullah</creatorcontrib><title>A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established.</description><subject>Biometrics</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Multimedia Information Systems</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Spoofing</subject><subject>Taxonomy</subject><subject>Trend analysis</subject><subject>Verification</subject><subject>Voice</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9UMlOwzAQjRBIlMIPcLLEtYaxncQJt6pikypxoHfLScaQlsbFdlDzEfwzpkHixmm2t4xeklwyuGYA8sYzBimnwBlljIuM7o-SCcukoFJydhx7UQCVGbDT5Mz7NQDLM55Okq858b37xIHYjuwceuyCDm0cdAi63pAGA9aHhbGO6D7YbbzXxO9Qb9CRT3StaeuR4wcfcOtvyUsUQWoNDW9ItQszEvTednY7zEjrfY-e6K4hpg-9Q9K0bvQ4T06Mfvd48Vunyer-brV4pMvnh6fFfElrkYtATcZlw7JK1E1toCpTKGVq8hxyXgoELbWEAgsQrJBlzKSqjC6NMMCLopQopsnVKLtz9iP-EtTa9q6LjopnBbASBEBE8RFVO-u9Q6N2rt1qNygG6id1NaauooM6pK72kSRGko_g7hXdn_Q_rG96VYga</recordid><startdate>20210901</startdate><enddate>20210901</enddate><creator>Tan, Choon Beng</creator><creator>Hijazi, Mohd Hanafi Ahmad</creator><creator>Khamis, Norazlina</creator><creator>Nohuddin, Puteri Nor Ellyza binti</creator><creator>Zainol, Zuraini</creator><creator>Coenen, Frans</creator><creator>Gani, Abdullah</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-7204-7305</orcidid><orcidid>https://orcid.org/0000-0003-1078-8885</orcidid><orcidid>https://orcid.org/0000-0002-4388-020X</orcidid><orcidid>https://orcid.org/0000-0003-0627-5630</orcidid><orcidid>https://orcid.org/0000-0003-1026-6649</orcidid><orcidid>https://orcid.org/0000-0003-0431-8967</orcidid><orcidid>https://orcid.org/0000-0002-6881-7039</orcidid></search><sort><creationdate>20210901</creationdate><title>A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction</title><author>Tan, Choon Beng ; Hijazi, Mohd Hanafi Ahmad ; Khamis, Norazlina ; Nohuddin, Puteri Nor Ellyza binti ; Zainol, Zuraini ; Coenen, Frans ; Gani, Abdullah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Biometrics</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Multimedia Information Systems</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Spoofing</topic><topic>Taxonomy</topic><topic>Trend analysis</topic><topic>Verification</topic><topic>Voice</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tan, Choon Beng</creatorcontrib><creatorcontrib>Hijazi, Mohd Hanafi Ahmad</creatorcontrib><creatorcontrib>Khamis, Norazlina</creatorcontrib><creatorcontrib>Nohuddin, Puteri Nor Ellyza binti</creatorcontrib><creatorcontrib>Zainol, Zuraini</creatorcontrib><creatorcontrib>Coenen, Frans</creatorcontrib><creatorcontrib>Gani, Abdullah</creatorcontrib><collection>Springer Nature Open Access Journals</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tan, Choon Beng</au><au>Hijazi, Mohd Hanafi Ahmad</au><au>Khamis, Norazlina</au><au>Nohuddin, Puteri Nor Ellyza binti</au><au>Zainol, Zuraini</au><au>Coenen, Frans</au><au>Gani, Abdullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-09-01</date><risdate>2021</risdate><volume>80</volume><issue>21-23</issue><spage>32725</spage><epage>32762</epage><pages>32725-32762</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-021-11235-x</doi><tpages>38</tpages><orcidid>https://orcid.org/0000-0002-7204-7305</orcidid><orcidid>https://orcid.org/0000-0003-1078-8885</orcidid><orcidid>https://orcid.org/0000-0002-4388-020X</orcidid><orcidid>https://orcid.org/0000-0003-0627-5630</orcidid><orcidid>https://orcid.org/0000-0003-1026-6649</orcidid><orcidid>https://orcid.org/0000-0003-0431-8967</orcidid><orcidid>https://orcid.org/0000-0002-6881-7039</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2021-09, Vol.80 (21-23), p.32725-32762 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2580190300 |
source | ABI/INFORM Global; Springer Nature |
subjects | Biometrics Computer Communication Networks Computer Science Data Structures and Information Theory Multimedia Information Systems Special Purpose and Application-Based Systems Spoofing Taxonomy Trend analysis Verification Voice |
title | A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T20%3A46%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20survey%20on%20presentation%20attack%20detection%20for%20automatic%20speaker%20verification%20systems:%20State-of-the-art,%20taxonomy,%20issues%20and%20future%20direction&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Tan,%20Choon%20Beng&rft.date=2021-09-01&rft.volume=80&rft.issue=21-23&rft.spage=32725&rft.epage=32762&rft.pages=32725-32762&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-021-11235-x&rft_dat=%3Cproquest_cross%3E2580190300%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2580190300&rft_id=info:pmid/&rfr_iscdi=true |