An Audio Fingerprinting Approach to Replay Attack Detection on ASVSPOOF 2017 Challenge Data

Joaquin Gonzalez-Rodriguez, Alvaro Escudero, Diego de Benito-Gorrón, Beltran Labrador, Javier Franco-Pedroso


Replay attacks, where an impostor replays a genuine user utterance, are a major vulnerability of speaker verification systems. Two highly likely scenarios for replay attacks are either hidden recording of actual spoken access trials, or reusing previous genuine recordings in case of fraudulent access to transmission channels or storage devices. In both scenarios, an audio fingerprint-based approach comparing any access trial with all previous recordings from the claimed speaker perfectly fits the task of replay attack detection. However, ASVspoof 2017 rules did not allow the use of the original RedDots audio files (spoofed trials are replayed versions of RedDots), which disabled a fingerprint-based regular participation in the evaluation as those original files are necessary to build the bank of previous-access audio fingerprints. Then, we agreed with the organizers to run and submit on time a parallel fingerprint-based evaluation with exactly the same blind test data with an alternative but realistic (deployable) evaluation scenario. While we obtained an Equal Error Rate of 8.91% detecting replayed versus genuine trials, this result is not comparable for ranking purposes with those from actual participants in the Challenge as we used the original RedDots files. However, it provides insight into the potential and complementarity of audio fingerprinting, especially for high audio-quality attacks where state-of-the-art acoustic antispoofing systems show poor performance (the best ASVspoof 2017 system with global EER of 6.73% degraded to about 25% in condition C6 of high-quality replays), while our fingerprint-based antispoofer obtains an EER of 0.0% for the high-quality replays in condition C6, showing the complementarity of acoustic antispoofers for low-mid quality replays and fingerprint-based ones for mid-high quality replays.


 DOI: 10.21437/Odyssey.2018-43

Cite as: Gonzalez-Rodriguez, J., Escudero, A., Benito-Gorrón, D.D., Labrador, B., Franco-Pedroso, J. (2018) An Audio Fingerprinting Approach to Replay Attack Detection on ASVSPOOF 2017 Challenge Data . Proc. Odyssey 2018 The Speaker and Language Recognition Workshop, 304-311, DOI: 10.21437/Odyssey.2018-43.


@inproceedings{Gonzalez-Rodriguez2018,
  author={Joaquin Gonzalez-Rodriguez and Alvaro Escudero and Diego de Benito-Gorrón and Beltran Labrador and Javier Franco-Pedroso},
  title={An Audio Fingerprinting Approach to Replay Attack Detection on ASVSPOOF 2017 Challenge Data	},
  year=2018,
  booktitle={Proc. Odyssey 2018 The Speaker and Language Recognition Workshop},
  pages={304--311},
  doi={10.21437/Odyssey.2018-43},
  url={http://dx.doi.org/10.21437/Odyssey.2018-43}
}