ISV-based speaker verification in spoof scenario on presentation attacks of AVspoof dataset
eer | 0.0479927 |
---|---|
far_dev | 0.0479381 |
far_test | 0.97747 |
frr_dev | 0.0480473 |
frr_test | 0.0314359 |
hter | 0.504453 |
threshold | 0.485038 |
number_of_negatives_dev | 54925 |
number_of_negatives_test | 43320 |
number_of_positives_dev | 4225 |
number_of_positives_test | 4708 |
roc_dev | |
roc_test |
This is an automatic speaker verification (ASV) system based on ISV modeling for a spoof scenario. Only presentation attacks from AVspoof database are used. GMM with 256 Gaussians was used to train a UBM. This experiment is essentially the same system as in pkorshunov/isv-speaker-verification/1/isv-speaker-verification-licit, but when spoofing data is used to attack the system.
Updated | Name | Actions | |
---|---|---|---|
July 15, 2016 | pkorshunov/ISV-based-ASV-system-spoof-scenario (Performance of ISV-based ASV system under spoofing attacks) |