The First VoicePrivacy Attacker Challenge
- URL: http://arxiv.org/abs/2504.14183v1
- Date: Sat, 19 Apr 2025 05:02:46 GMT
- Title: The First VoicePrivacy Attacker Challenge
- Authors: Natalia Tomashenko, Xiaoxiao Miao, Emmanuel Vincent, Junichi Yamagishi,
- Abstract summary: The First VoicePrivacy Attacker Challenge is an ICASSP 2025 SP Grand Challenge.<n>It focuses on evaluating attacker systems against a set of voice anonymization systems submitted to the VoicePrivacy 2024 Challenge.<n>The best attacker systems reduced the equal error rate (EER) by 25-44% relative w.r.t. the baseline.
- Score: 39.256453635652484
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The First VoicePrivacy Attacker Challenge is an ICASSP 2025 SP Grand Challenge which focuses on evaluating attacker systems against a set of voice anonymization systems submitted to the VoicePrivacy 2024 Challenge. Training, development, and evaluation datasets were provided along with a baseline attacker. Participants developed their attacker systems in the form of automatic speaker verification systems and submitted their scores on the development and evaluation data. The best attacker systems reduced the equal error rate (EER) by 25-44% relative w.r.t. the baseline.
Related papers
- Generative Data Augmentation Challenge: Zero-Shot Speech Synthesis for Personalized Speech Enhancement [54.51467153859695]
This paper presents a new challenge that calls for zero-shot text-to-speech (TTS) systems to augment speech data for the downstream task, personalized speech enhancement (PSE)
We aim to investigate how the quality of augmented data generated by zero-shot TTS models affects PSE model performance.
arXiv Detail & Related papers (2025-01-23T04:27:37Z) - The First VoicePrivacy Attacker Challenge Evaluation Plan [39.256453635652484]
The First VoicePrivacy Attacker Challenge is a new kind of challenge organized as part of the VoicePrivacy initiative and supported by ICASSP 2025 as the SP Grand Challenge.
It focuses on developing attacker systems against voice anonymization, which will be evaluated against a set of anonymization systems submitted to the VoicePrivacy 2024 Challenge.
arXiv Detail & Related papers (2024-10-09T20:48:03Z) - HLTCOE JHU Submission to the Voice Privacy Challenge 2024 [31.94758615908198]
We present a number of systems for the Voice Privacy Challenge.
We find that while voice conversion systems better preserve emotional content, they struggle to conceal speaker identity in semi-white-box attack scenarios.
We propose a random admixture system which seeks to balance out the strengths and weaknesses of the two categories of systems.
arXiv Detail & Related papers (2024-09-13T15:29:37Z) - ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale [59.25180900687571]
ASVspoof 5 is the fifth edition in a series of challenges that promote the study of speech spoofing and deepfake attacks.
We describe the two challenge tracks, the new database, the evaluation metrics, and the evaluation platform, and present a summary of the results.
arXiv Detail & Related papers (2024-08-16T13:37:20Z) - Unified Physical-Digital Attack Detection Challenge [70.67222784932528]
Face Anti-Spoofing (FAS) is crucial to safeguard Face Recognition (FR) Systems.
UniAttackData is the largest public dataset for Unified Attack Detection.
We organized a Unified Physical-Digital Face Attack Detection Challenge to boost the research in Unified Attack Detections.
arXiv Detail & Related papers (2024-04-09T11:00:11Z) - PITCH: AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response [14.604998731837595]
PITCH is a robust challenge-response method to detect and tag interactive deepfake audio calls.
We developed a comprehensive taxonomy of audio challenges based on the human auditory system, linguistics, and environmental factors.
Our solution gave users maximum control and boosted detection accuracy to 84.5%.
arXiv Detail & Related papers (2024-02-28T06:17:55Z) - Acoustic Cybersecurity: Exploiting Voice-Activated Systems [0.0]
Our research extends the feasibility of these attacks across various platforms like Amazon's Alexa, Android, iOS, and Cortana.
We quantitatively show that attack success rates hover around 60%, with the ability to activate devices remotely from over 100 feet away.
These attacks threaten critical infrastructure, emphasizing the need for multifaceted defensive strategies.
arXiv Detail & Related papers (2023-11-23T02:26:11Z) - The VoicePrivacy 2020 Challenge: Results and findings [60.13468541150838]
The first VoicePrivacy 2020 Challenge focuses on developing anonymization solutions for speech technology.
We provide a systematic overview of the challenge design with an analysis of submitted systems and evaluation results.
arXiv Detail & Related papers (2021-09-01T23:40:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.