Loading…

A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction

The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification...

Full description

Saved in:
Bibliographic Details
Published in:Multimedia tools and applications 2021-09, Vol.80 (21-23), p.32725-32762
Main Authors: Tan, Choon Beng, Hijazi, Mohd Hanafi Ahmad, Khamis, Norazlina, Nohuddin, Puteri Nor Ellyza binti, Zainol, Zuraini, Coenen, Frans, Gani, Abdullah
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3
cites cdi_FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3
container_end_page 32762
container_issue 21-23
container_start_page 32725
container_title Multimedia tools and applications
container_volume 80
creator Tan, Choon Beng
Hijazi, Mohd Hanafi Ahmad
Khamis, Norazlina
Nohuddin, Puteri Nor Ellyza binti
Zainol, Zuraini
Coenen, Frans
Gani, Abdullah
description The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established.
doi_str_mv 10.1007/s11042-021-11235-x
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2580190300</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2580190300</sourcerecordid><originalsourceid>FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3</originalsourceid><addsrcrecordid>eNp9UMlOwzAQjRBIlMIPcLLEtYaxncQJt6pikypxoHfLScaQlsbFdlDzEfwzpkHixmm2t4xeklwyuGYA8sYzBimnwBlljIuM7o-SCcukoFJydhx7UQCVGbDT5Mz7NQDLM55Okq858b37xIHYjuwceuyCDm0cdAi63pAGA9aHhbGO6D7YbbzXxO9Qb9CRT3StaeuR4wcfcOtvyUsUQWoNDW9ItQszEvTednY7zEjrfY-e6K4hpg-9Q9K0bvQ4T06Mfvd48Vunyer-brV4pMvnh6fFfElrkYtATcZlw7JK1E1toCpTKGVq8hxyXgoELbWEAgsQrJBlzKSqjC6NMMCLopQopsnVKLtz9iP-EtTa9q6LjopnBbASBEBE8RFVO-u9Q6N2rt1qNygG6id1NaauooM6pK72kSRGko_g7hXdn_Q_rG96VYga</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2580190300</pqid></control><display><type>article</type><title>A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction</title><source>ABI/INFORM Global</source><source>Springer Nature</source><creator>Tan, Choon Beng ; Hijazi, Mohd Hanafi Ahmad ; Khamis, Norazlina ; Nohuddin, Puteri Nor Ellyza binti ; Zainol, Zuraini ; Coenen, Frans ; Gani, Abdullah</creator><creatorcontrib>Tan, Choon Beng ; Hijazi, Mohd Hanafi Ahmad ; Khamis, Norazlina ; Nohuddin, Puteri Nor Ellyza binti ; Zainol, Zuraini ; Coenen, Frans ; Gani, Abdullah</creatorcontrib><description>The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-021-11235-x</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Biometrics ; Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Multimedia Information Systems ; Special Purpose and Application-Based Systems ; Spoofing ; Taxonomy ; Trend analysis ; Verification ; Voice</subject><ispartof>Multimedia tools and applications, 2021-09, Vol.80 (21-23), p.32725-32762</ispartof><rights>The Author(s) 2021</rights><rights>The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3</citedby><cites>FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3</cites><orcidid>0000-0002-7204-7305 ; 0000-0003-1078-8885 ; 0000-0002-4388-020X ; 0000-0003-0627-5630 ; 0000-0003-1026-6649 ; 0000-0003-0431-8967 ; 0000-0002-6881-7039</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2580190300/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2580190300?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,11687,27923,27924,36059,44362,74766</link.rule.ids></links><search><creatorcontrib>Tan, Choon Beng</creatorcontrib><creatorcontrib>Hijazi, Mohd Hanafi Ahmad</creatorcontrib><creatorcontrib>Khamis, Norazlina</creatorcontrib><creatorcontrib>Nohuddin, Puteri Nor Ellyza binti</creatorcontrib><creatorcontrib>Zainol, Zuraini</creatorcontrib><creatorcontrib>Coenen, Frans</creatorcontrib><creatorcontrib>Gani, Abdullah</creatorcontrib><title>A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established.</description><subject>Biometrics</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Multimedia Information Systems</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Spoofing</subject><subject>Taxonomy</subject><subject>Trend analysis</subject><subject>Verification</subject><subject>Voice</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9UMlOwzAQjRBIlMIPcLLEtYaxncQJt6pikypxoHfLScaQlsbFdlDzEfwzpkHixmm2t4xeklwyuGYA8sYzBimnwBlljIuM7o-SCcukoFJydhx7UQCVGbDT5Mz7NQDLM55Okq858b37xIHYjuwceuyCDm0cdAi63pAGA9aHhbGO6D7YbbzXxO9Qb9CRT3StaeuR4wcfcOtvyUsUQWoNDW9ItQszEvTednY7zEjrfY-e6K4hpg-9Q9K0bvQ4T06Mfvd48Vunyer-brV4pMvnh6fFfElrkYtATcZlw7JK1E1toCpTKGVq8hxyXgoELbWEAgsQrJBlzKSqjC6NMMCLopQopsnVKLtz9iP-EtTa9q6LjopnBbASBEBE8RFVO-u9Q6N2rt1qNygG6id1NaauooM6pK72kSRGko_g7hXdn_Q_rG96VYga</recordid><startdate>20210901</startdate><enddate>20210901</enddate><creator>Tan, Choon Beng</creator><creator>Hijazi, Mohd Hanafi Ahmad</creator><creator>Khamis, Norazlina</creator><creator>Nohuddin, Puteri Nor Ellyza binti</creator><creator>Zainol, Zuraini</creator><creator>Coenen, Frans</creator><creator>Gani, Abdullah</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-7204-7305</orcidid><orcidid>https://orcid.org/0000-0003-1078-8885</orcidid><orcidid>https://orcid.org/0000-0002-4388-020X</orcidid><orcidid>https://orcid.org/0000-0003-0627-5630</orcidid><orcidid>https://orcid.org/0000-0003-1026-6649</orcidid><orcidid>https://orcid.org/0000-0003-0431-8967</orcidid><orcidid>https://orcid.org/0000-0002-6881-7039</orcidid></search><sort><creationdate>20210901</creationdate><title>A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction</title><author>Tan, Choon Beng ; Hijazi, Mohd Hanafi Ahmad ; Khamis, Norazlina ; Nohuddin, Puteri Nor Ellyza binti ; Zainol, Zuraini ; Coenen, Frans ; Gani, Abdullah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Biometrics</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Multimedia Information Systems</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Spoofing</topic><topic>Taxonomy</topic><topic>Trend analysis</topic><topic>Verification</topic><topic>Voice</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tan, Choon Beng</creatorcontrib><creatorcontrib>Hijazi, Mohd Hanafi Ahmad</creatorcontrib><creatorcontrib>Khamis, Norazlina</creatorcontrib><creatorcontrib>Nohuddin, Puteri Nor Ellyza binti</creatorcontrib><creatorcontrib>Zainol, Zuraini</creatorcontrib><creatorcontrib>Coenen, Frans</creatorcontrib><creatorcontrib>Gani, Abdullah</creatorcontrib><collection>Springer Nature Open Access Journals</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tan, Choon Beng</au><au>Hijazi, Mohd Hanafi Ahmad</au><au>Khamis, Norazlina</au><au>Nohuddin, Puteri Nor Ellyza binti</au><au>Zainol, Zuraini</au><au>Coenen, Frans</au><au>Gani, Abdullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-09-01</date><risdate>2021</risdate><volume>80</volume><issue>21-23</issue><spage>32725</spage><epage>32762</epage><pages>32725-32762</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-021-11235-x</doi><tpages>38</tpages><orcidid>https://orcid.org/0000-0002-7204-7305</orcidid><orcidid>https://orcid.org/0000-0003-1078-8885</orcidid><orcidid>https://orcid.org/0000-0002-4388-020X</orcidid><orcidid>https://orcid.org/0000-0003-0627-5630</orcidid><orcidid>https://orcid.org/0000-0003-1026-6649</orcidid><orcidid>https://orcid.org/0000-0003-0431-8967</orcidid><orcidid>https://orcid.org/0000-0002-6881-7039</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2021-09, Vol.80 (21-23), p.32725-32762
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2580190300
source ABI/INFORM Global; Springer Nature
subjects Biometrics
Computer Communication Networks
Computer Science
Data Structures and Information Theory
Multimedia Information Systems
Special Purpose and Application-Based Systems
Spoofing
Taxonomy
Trend analysis
Verification
Voice
title A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T20%3A46%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20survey%20on%20presentation%20attack%20detection%20for%20automatic%20speaker%20verification%20systems:%20State-of-the-art,%20taxonomy,%20issues%20and%20future%20direction&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Tan,%20Choon%20Beng&rft.date=2021-09-01&rft.volume=80&rft.issue=21-23&rft.spage=32725&rft.epage=32762&rft.pages=32725-32762&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-021-11235-x&rft_dat=%3Cproquest_cross%3E2580190300%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c363t-f527d15b3cdcf0b940974f6606293e0a7a708e8031879021bbfa9f3f028897e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2580190300&rft_id=info:pmid/&rfr_iscdi=true