IDEAS home Printed from https://ideas.repec.org/a/abq/ijist1/v3y2022i5p153-165.html
   My bibliography  Save this article

Voice Spoofing Countermeasure Based on Spectral Features to Detect Synthetic Attacks Through LSTM

Author

Listed:
  • Gulam Qadir

    (University of Engineering and Technology Taxila, Punjab Pakistan)

  • Saima Zareen

    (University of Engineering and Technology Taxila, Punjab Pakistan)

  • Farman Hassan

    (University of Engineering and Technology Taxila, Punjab Pakistan)

  • Auliya Ur Rahman

    (University of Engineering and Technology Taxila, Punjab Pakistan)

Abstract

With the growing number of voice-controlled devices, it is necessary to address the potential vulnerabilities of Automatic Speaker Verification (ASV) against voice spoofing attacks such as Physical Access (PA) and Logical Access (LA) attacks. To improve the reliability of ASV systems, researchers have developed various voice spoofing countermeasures. However, it is hard for the voice anti-spoofing systems to effectively detect the synthetic speech attacks that are generated through powerful spoofing algorithms and have quite different statistical distributions. More importantly, the speedy improvement of voice spoofing structures is producing the most effective attacks that make ASV structures greater vulnerable to stumble on those voice spoofing assaults. In this paper, we proposed a unique voice spoofing countermeasure which is successful to hit upon the LA attacks (i.e., artificial speech and transformed speech) and classify the spoofing structures by the usage of Long Short-Term Reminiscence (LSTM). The novel set of spectral features i.e., Mel-Frequency Cepstral Coefficients (MFCC), Gammatone Cepstral Coefficients (GTCC), and spectral centroid are capable to seize maximum alterations present in the cloned audio. The proposed system achieved remarkable accuracy of 98.93%, precision of 100%, recall of 92.32%, F1-score of 96.01%, and an Equal Error Rate (EER) of 1.30%. Our method achieved 8.5% and 7.02% smaller EER than the baseline methods such as Constant-Q Cepstral Coefficients (CQCC) using Gaussian Mixture Model (GMM) and Linear Frequency Cepstral Coefficients (LFCC) using GMM, respectively. We evaluated the performance of the proposed system on the standard dataset i.e., ASVspoof2019 LA. Experimental results and comparative analysis with other existing state-of-the-art methods illustrate that our method is reliable and effective to be used for the detection of voice spoofing attacks.

Suggested Citation

  • Gulam Qadir & Saima Zareen & Farman Hassan & Auliya Ur Rahman, 2022. "Voice Spoofing Countermeasure Based on Spectral Features to Detect Synthetic Attacks Through LSTM," International Journal of Innovations in Science & Technology, 50sea, vol. 3(5), pages 153-165, January.
  • Handle: RePEc:abq:ijist1:v:3:y:2022:i:5:p:153-165
    DOI: https://doi.org/10.33411/IJIST/2021030512
    as

    Download full text from publisher

    File URL: https://journal.50sea.com/index.php/IJIST/article/view/124/580
    Download Restriction: no

    File URL: https://journal.50sea.com/index.php/IJIST/article/view/124
    Download Restriction: no

    File URL: https://libkey.io/https://doi.org/10.33411/IJIST/2021030512?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Keywords

    ASVspoof 2019 LA dataset; Deep Learning; Spoofing countermeasure; Synthetic Speech; Voice anti-spoofing;
    All these keywords.

    JEL classification:

    • R00 - Urban, Rural, Regional, Real Estate, and Transportation Economics - - General - - - General
    • Z0 - Other Special Topics - - General

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:abq:ijist1:v:3:y:2022:i:5:p:153-165. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Hafiz Haroon Ahmad, Iqra Nazeer (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.