{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:09:49Z","timestamp":1773277789280,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Detection of spoof is essential for improving the performance of current scenario of Automatic Speaker Verification (ASV) systems. Empowerment to both frontend and backend parts can build the robust ASV systems. First, this paper discuses performance comparison of static and static\u2013dynamic Constant Q Cepstral Coefficients (CQCC) frontend features by using Long Short Term Memory (LSTM) with Time Distributed Wrappers model at the backend. Second, it performs comparative analysis of ASV systems built using three deep learning models LSTM with Time Distributed Wrappers, LSTM and Convolutional Neural Network at backend and using static\u2013dynamic CQCC features at frontend. Third, it discusses implementation of two spoof detection systems for ASV by using same static\u2013dynamic CQCC features at frontend and different combination of deep learning models at backend. Out of these two, the first one is a voting protocol based two-level spoof detection system that uses CNN, LSTM model at first level and LSTM with Time Distributed Wrappers model at second level. The second one is a two-level spoof detection system with user identification and verification protocol, which uses LSTM model for user identification at first level and LSTM with Time Distributed Wrappers for verification at the second level. For implementing the proposed work, a variation in ASVspoof 2019 dataset has been used to introduce all types of spoofing attacks such as Speech Synthesis (SS), Voice Conversion (VC) and replay in single set of dataset. The results show that, at frontend, static\u2013dynamic CQCC feature outperform static CQCC features and at the backend, hybrid combination of deep learning models increases accuracy of spoof detection systems.<\/jats:p>","DOI":"10.1007\/s40747-021-00565-w","type":"journal-article","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T15:02:29Z","timestamp":1637334149000},"page":"1153-1166","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Static\u2013dynamic features and hybrid deep learning models based spoof detection system for ASV"],"prefix":"10.1007","volume":"8","author":[{"given":"Aakshi","family":"Mittal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7071-8323","authenticated-orcid":false,"given":"Mohit","family":"Dua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,19]]},"reference":[{"issue":"7","key":"565_CR1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S0969-4765(13)70128-0","volume":"2013","author":"B Beranek","year":"2013","unstructured":"Beranek B (2013) Voice biometrics: success stories, success factors and what\u2019s next. Biometr Technol Today 2013(7):9\u201311","journal-title":"Biometr Technol Today"},{"issue":"5","key":"565_CR2","first-page":"140","volume":"6","author":"A Indumathi","year":"2012","unstructured":"Indumathi A, Chandra E (2012) Survey on speech synthesis. Signal Process Int J (SPIJ) 6(5):140","journal-title":"Signal Process Int J (SPIJ)"},{"key":"565_CR3","unstructured":"Lim R, Kwan E (2011) Voice conversion application (VOCAL). In: 2011 international conference on uncertainty reasoning and knowledge engineering, vol 1. IEEE, pp 259\u2013262"},{"key":"565_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.specom.2017.01.008","volume":"88","author":"SH Mohammadi","year":"2017","unstructured":"Mohammadi SH, Kain A (2017) An overview of voice conversion systems. Speech Commun 88:65\u201382","journal-title":"Speech Commun"},{"key":"565_CR5","doi-asserted-by":"crossref","unstructured":"Patil HA, Kamble MR (2018) A survey on replay attack detection for automatic speaker verification (ASV) system. In: 2018 Asia-Pacific signal and information processing association annual summit and conference (APSIPA ASC). IEEE, pp 1047\u20131053","DOI":"10.23919\/APSIPA.2018.8659666"},{"key":"565_CR6","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"Z Wu","year":"2015","unstructured":"Wu Z, Evans N, Kinnunen T, Yamagishi J, Alegre F, Li H (2015) Spoofing and countermeasures for speaker verification: a survey. Speech Commun 66:130\u2013153","journal-title":"Speech Commun"},{"key":"565_CR7","doi-asserted-by":"crossref","unstructured":"Hautam\u00e4ki RG, Kinnunen T, Hautam\u00e4ki V, Leino T, Laukkanen AM (2013) I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry. In: Interspeech, pp 930\u2013934","DOI":"10.21437\/Interspeech.2013-289"},{"key":"565_CR8","first-page":"5000","volume":"4000","author":"RG Hautam\u00e4ki","year":"2014","unstructured":"Hautam\u00e4ki RG, Kinnunen T, Hautam\u00e4ki V, Laukkanen AM (2014) Comparison of human listeners and speaker verification systems using voice mimicry data. Target 4000:5000","journal-title":"Target"},{"key":"565_CR9","doi-asserted-by":"crossref","unstructured":"Lindberg J, Blomberg M (1999) Vulnerability in speaker verification-a study of technical impostor techniques. In: Sixth European conference on speech communication and technology","DOI":"10.21437\/Eurospeech.1999-283"},{"key":"565_CR10","doi-asserted-by":"crossref","unstructured":"Chettri B, Stoller D, Morfi V, Ram\u00edrez MAM, Benetos E, Sturm BL (2019) Ensemble models for spoofing detection in automatic speaker verification. arXiv:1904.04589. arXiv preprint","DOI":"10.21437\/Interspeech.2019-2505"},{"key":"565_CR11","doi-asserted-by":"crossref","unstructured":"Sahidullah M, Delgado H, Todisco M, Yu H, Kinnunen T, Evans N, Tan ZH (2016) Integrated spoofing countermeasures and automatic speaker verification: an evaluation on ASVspoof 2015","DOI":"10.21437\/Interspeech.2016-1280"},{"key":"565_CR12","doi-asserted-by":"crossref","unstructured":"Lavrentyeva G, Novoselov S, Malykh E, Kozlov A, Kudashev O, Shchemelinin V (2017) Audio replay attack detection with deep learning frameworks. In: Interspeech, pp 82\u201386","DOI":"10.21437\/Interspeech.2017-360"},{"key":"565_CR13","doi-asserted-by":"crossref","unstructured":"Campbell JP (1995) Testing with the YOHO CD-ROM voice verification corpus. In: 1995 international conference on acoustics, speech, and signal processing, vol 1. IEEE, pp 341\u2013344","DOI":"10.1109\/ICASSP.1995.479543"},{"issue":"1","key":"565_CR14","first-page":"11","volume":"5","author":"S Chakroborty","year":"2009","unstructured":"Chakroborty S, Saha G (2009) Improved text-independent speaker identification using fused MFCC & IMFCC feature sets based on Gaussian filter. Int J Signal Process 5(1):11\u201319","journal-title":"Int J Signal Process"},{"key":"565_CR15","doi-asserted-by":"crossref","unstructured":"Cai W, Wu H, Cai D, Li M (2019) The DKU replay detection system for the ASVspoof 2019 challenge: on data augmentation, feature representation, classification, and fusion. arXiv:1907.02663. arXiv preprint","DOI":"10.21437\/Interspeech.2019-1230"},{"key":"565_CR16","doi-asserted-by":"publisher","first-page":"84229","DOI":"10.1109\/ACCESS.2019.2923806","volume":"7","author":"BT Balamurali","year":"2019","unstructured":"Balamurali BT, Lin KE, Lui S, Chen JM, Herremans D (2019) Toward robust audio spoofing detection: a detailed comparison of traditional and learned features. IEEE Access 7:84229\u201384241","journal-title":"IEEE Access"},{"key":"565_CR17","doi-asserted-by":"crossref","unstructured":"Dua M, Aggarwal RK, Biswas M (2017) Discriminative training using heterogeneous feature vector for Hindi automatic speech recognition system. In: International conference on computer and applications (ICCA), pp 158\u2013162","DOI":"10.1109\/COMAPP.2017.8079777"},{"key":"565_CR18","doi-asserted-by":"crossref","unstructured":"Sahidullah M, Kinnunen T, Hanil\u00e7i C (2015) A comparison of features for synthetic speech detection. In: 16th Annual Conference of the International Speech Communication Association (INTERSPEECH 2015), pp 2087\u20132091","DOI":"10.21437\/Interspeech.2015-472"},{"key":"565_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.csl.2017.10.001","volume":"48","author":"M Pal","year":"2018","unstructured":"Pal M, Paul D, Saha G (2018) Synthetic speech detection using fundamental frequency variation and spectral features. Comput Speech Lang 48:31\u201350","journal-title":"Comput Speech Lang"},{"key":"565_CR20","doi-asserted-by":"crossref","unstructured":"Todisco M, Delgado H, Evans NW (2016) Articulation rate filtering of CQCC features for automatic speaker verification. In: Interspeech, pp 3628\u20133632","DOI":"10.21437\/Interspeech.2016-1140"},{"key":"565_CR21","doi-asserted-by":"crossref","unstructured":"Jelil S, Das RK, Prasanna SM, Sinha R (2017) Spoof detection using source, instantaneous frequency and cepstral features. In: Interspeech, pp 22\u201326","DOI":"10.21437\/Interspeech.2017-930"},{"key":"565_CR22","doi-asserted-by":"crossref","unstructured":"Dua M, Aggarwal R, Kadyan V, Dua S (2012) Punjabi Speech to text system for connected words, pp 206\u2013209","DOI":"10.1049\/cp.2012.2528"},{"issue":"1","key":"565_CR23","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1515\/jisys-2017-0618","volume":"29","author":"M Dua","year":"2018","unstructured":"Dua M, Aggarwal RK, Biswas M (2018) Discriminative training using noise robust integrated features and refined HMM modeling. J Intell Syst 29(1):327\u2013344","journal-title":"J Intell Syst"},{"key":"565_CR24","doi-asserted-by":"crossref","unstructured":"Dua M, Aggarwal RK, Biswas M (2019) GFCC based discriminatively trained noise robust continuous ASR system for Hindi language. J Ambient Intell Hum Comput 10(2)","DOI":"10.1007\/s12652-018-0828-x"},{"issue":"10","key":"565_CR25","doi-asserted-by":"publisher","first-page":"6747","DOI":"10.1007\/s00521-018-3499-9","volume":"31","author":"M Dua","year":"2019","unstructured":"Dua M, Aggarwal RK, Biswas M (2019) Discriminatively trained continuous Hindi speech recognition system using interpolated recurrent neural network language modeling. Neural Comput Appl 31(10):6747\u20136755","journal-title":"Neural Comput Appl"},{"key":"565_CR26","doi-asserted-by":"crossref","unstructured":"Kumar MG, Kumar SR, Saranya MS, Bharathi B, Murthy HA (2019) Spoof detection using time-delay shallow neural network and feature switching. In: 2019 IEEE automatic speech recognition and understanding workshop (ASRU). IEEE, pp 1011\u20131017","DOI":"10.1109\/ASRU46091.2019.9003824"},{"key":"565_CR27","unstructured":"ASVspoof 2019: automatic speaker verification spoofing and countermeasures challenge evaluation plan*. http:\/\/www.asvspoof.org\/"},{"key":"565_CR28","doi-asserted-by":"crossref","unstructured":"Huang L, Pun CM (2019) Audio replay spoof attack detection using segment-based hybrid feature and Dense Net-LSTM network. In: ICASSP 2019\u20132019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2567\u20132571","DOI":"10.1109\/ICASSP.2019.8682573"},{"key":"565_CR29","unstructured":"Mobiny A, Najarian M (2018) Text-independent speaker verification using long short-term memory networks. arXiv:1805.00604. arXiv preprint"},{"key":"565_CR30","doi-asserted-by":"crossref","unstructured":"Dua M, Jain C, Kumar S (2021) LSTM and CNN based ensemble approach for spoof detection task in automatic speaker verification systems. J Ambient Intell Human Comput","DOI":"10.1007\/s12652-021-02960-0"},{"key":"565_CR31","doi-asserted-by":"crossref","unstructured":"Mittal A, Dua M (2021) Automatic speaker verification system using three dimensional static and contextual variation-based features with two dimensional convolutional neural network. International J Swarm Intell","DOI":"10.1504\/IJSI.2021.118608"},{"key":"565_CR32","doi-asserted-by":"crossref","unstructured":"Mittal A, Dua M (2021) Constant Q cepstral coefficients and long short-term memory model-based automatic speaker verification system. In: Proceedings of international conference on intelligent computing, information and control systems, pp 895\u2013904","DOI":"10.1007\/978-981-15-8443-5_76"},{"key":"565_CR33","doi-asserted-by":"crossref","unstructured":"Chettri B, Mishra S, Sturm BL, Benetos E (2018) Analysing the predictions of a cnn-based replay spoofing detection system. In: 2018 IEEE spoken language technology workshop (SLT). IEEE, pp 92\u201397","DOI":"10.1109\/SLT.2018.8639666"},{"key":"565_CR34","doi-asserted-by":"crossref","unstructured":"Valenti G, Delgado H, Todisco M, Evans NW, Pilati L (2018) An end-to-end spoofing countermeasure for automatic speaker verification using evolving recurrent neural networks. In: Odyssey, pp 288\u2013295","DOI":"10.21437\/Odyssey.2018-41"},{"key":"565_CR35","doi-asserted-by":"crossref","unstructured":"Kamble MR, Sailor HB, Patil HA, Li H (2019) Advances in anti-spoofing: from the perspective of ASVspoof challenges. APSIPA Trans Signal Inf Process 9","DOI":"10.1017\/ATSIP.2019.21"},{"key":"565_CR36","doi-asserted-by":"crossref","unstructured":"Lai CI, Abad A, Richmond K, Yamagishi J, Dehak N, King S (2019) Attentive filtering networks for audio replay attack detection. In: ICASSP 2019\u20132019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 6316\u20136320","DOI":"10.1109\/ICASSP.2019.8682640"},{"key":"565_CR37","unstructured":"Edinburgh Data Share https:\/\/datashare.is.ed.ac.uk\/handle\/10283\/3336"},{"issue":"5","key":"565_CR38","doi-asserted-by":"publisher","first-page":"2698","DOI":"10.1121\/1.404385","volume":"92","author":"JC Brown","year":"1992","unstructured":"Brown JC, Puckette MS (1992) An efficient algorithm for the calculation of a constant Q transform. J Acoust Soc Am 92(5):2698\u20132701","journal-title":"J Acoust Soc Am"},{"issue":"1","key":"565_CR39","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1121\/1.400476","volume":"89","author":"JC Brown","year":"1991","unstructured":"Brown JC (1991) Calculation of a constant Q spectral transform. J Acoust Soc Am 89(1):425\u2013434","journal-title":"J Acoust Soc Am"},{"key":"565_CR40","doi-asserted-by":"crossref","unstructured":"Yang J, Das RK, Li H (2018) Extended constant-Q cepstral coefficients for detection of spoofing attacks. In: 2018 Asia-Pacific signal and information processing association annual summit and conference (APSIPA ASC). IEEE, pp 1024\u20131029","DOI":"10.23919\/APSIPA.2018.8659537"},{"key":"565_CR41","doi-asserted-by":"crossref","unstructured":"Glover JC, Lazzarini V, Timoney J (2011) Python for audio signal processing. In: Linux Audio Conference 2011, May 6-8 2011, Maynooth, Ireland","DOI":"10.1186\/1687-6180-2011-68"},{"key":"565_CR42","doi-asserted-by":"crossref","unstructured":"Cheuk KW, Anderson H, Agres K, Herremans D (2019) nnAudio: an on-the-fly GPU audio to spectrogram conversion toolbox using 1D convolution neural networks. arXiv:1912.12055. arXiv preprint","DOI":"10.1109\/ACCESS.2020.3019084"},{"issue":"11","key":"565_CR43","doi-asserted-by":"publisher","first-page":"2002","DOI":"10.1109\/TASLP.2018.2851155","volume":"26","author":"H Dinkel","year":"2018","unstructured":"Dinkel H, Qian Y, Yu K (2018) Investigating raw wave deep neural networks for end-to-end speaker spoofing detection. IEEE\/ACM Trans Audio Speech Lang Process 26(11):2002\u20132014","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"key":"565_CR44","unstructured":"Kingma D, Ba J (2014) Adam: a method for stochastic optimization. In: Proc. Int. Conf. Learn. Representations, pp 1\u201313"},{"key":"565_CR45","unstructured":"Brownlee J (2021) https:\/\/machinelearningmastery.com\/adam-optimization-algorithm-for-deep-learning\/. Machine Learning Mastery Pty. Ltd"},{"key":"565_CR46","doi-asserted-by":"crossref","unstructured":"Jung JW, Shim HJ, Heo HS, Yu HJ (2019) Replay attack detection with complementary high-resolution information using end-to-end DNN for the ASVspoof 2019 Challenge. arXiv:1904.10134. arXiv preprint","DOI":"10.21437\/Interspeech.2019-1991"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00565-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00565-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00565-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,15]],"date-time":"2023-01-15T21:26:09Z","timestamp":1673817969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00565-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,19]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["565"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00565-w","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,19]]},"assertion":[{"value":"2 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The submitted work does not have any conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}