Journal of Future Networks and Communications

Journal of Future Networks and Communications

Enhanced Adversarial Spectro Phonetic Learning for Robust Voice Spoof Detection Using VCC 2022 Dataset

Electrical and Computer Science Engineering, University of Windsor, Windsor, ON N9B 3P4, Canada.

Rahul Kumar Ravichandran

Department of Electronics and Communication Engineering, Sri Eshwar College of Engineering, Tamil Nadu, India.

Thamaraimanalan T

Journal of Future Networks and Communications

Received On : 30 October 2024

Revised On : 28 November 2024

Accepted On : 27 December 2024

Published On : 05 January 2025

Volume 01, Issue 01

Pages : 041-050


Article Views

Abstract


Speaker identification System (SIS) and automatic speaker verification (ASV) like voice-based systems are essential in industries like finance and healthcare for confirming identities using unique speech patterns. However, these systems can be cheated by spoofing attacks. A new method called Enhanced Adversarial Spectro-Phonetic Learning (EASPL) is introduced in this research. EASPL uses deep learning with adversarial training and a mix of spectral and phonetic features. This approach helps the system learn to recognize fake voices better by exposing it to synthetic adversarial examples during training. EASPL is tested on the Voice Conversion Challenge (VCC) 2022 dataset and showed great results with an accuracy of 99.68% and an equal error rate (EER) of 0.011, making it effective and reliable in spotting spoofing attacks while being efficient. Additionally, the model's robustness against varied spoofing techniques demonstrates potential for real-world applications.


Keywords


Spoofing Detection, Adversarial Training, Spectral Features, Phonetic Features, Deep Learning, VCC 2022.


  1. H. Wu, W. Guo, S. Peng, Z. Li, and J. Zhang, “Adapter Learning from Pre-trained Model for Robust Spoof Speech Detection,” Interspeech 2024, pp. 2095–2099, Sep. 2024, doi: 10.21437/interspeech.2024-253.
  2. S. Mavaddati, “A Voice Activity Detection Algorithm Using Sparse Non-negative Matrix Factorization-based Model Learning in Spectro-Temporal Domain,” International Journal of Engineering, vol. 36, no. 8, pp. 1478–1488, 2023, doi: 10.5829/ije.2023.36.08b.08.
  3. J. Vitorino, N. Oliveira, and I. Praça, “Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection,” Future Internet, vol. 14, no. 4, p. 108, Mar. 2022, doi: 10.3390/fi14040108.
  4. J. Chi and Z. Mao, “Deep domain-adversarial anomaly detection with robust one-class transfer learning,” Knowledge-Based Systems, vol. 300, p. 112225, Sep. 2024, doi: 10.1016/j.knosys.2024.112225.
  5. A. Khan, K. M. Malik, J. Ryan, and M. Saravanan, “Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures,” Artificial Intelligence Review, vol. 56, no. S1, pp. 513–566, Jun. 2023, doi: 10.1007/s10462-023-10539-8.
  6. P. Parasu, J. Epps, K. Sriskandaraja, and G. Suthokumar, “Investigating Light-ResNet Architecture for Spoofing Detection Under Mismatched Conditions,” Interspeech 2020, Oct. 2020, doi: 10.21437/interspeech.2020-2039.
  7. A. Javed, K. M. Malik, H. Malik, and A. Irtaza, “Voice spoofing detector: A unified anti-spoofing framework,” Expert Systems with Applications, vol. 198, p. 116770, Jul. 2022, doi: 10.1016/j.eswa.2022.116770.
  8. J. Zhou, T. Hai, D. N. A. Jawawi, D. Wang, E. Ibeke, and C. Biamba, “Voice spoofing countermeasure for voice replay attacks using deep learning,” Journal of Cloud Computing, vol. 11, no. 1, Sep. 2022, doi: 10.1186/s13677-022-00306-5.
  9. R. Rahmeni, A. B. Aicha, and Y. B. Ayed, “Acoustic features exploration and examination for voice spoofing counter measures with boosting machine learning techniques,” Procedia Computer Science, vol. 176, pp. 1073–1082, 2020, doi: 10.1016/j.procs.2020.09.103.
  10. Y. Zhang, F. Jiang, and Z. Duan, “One-Class Learning Towards Synthetic Voice Spoofing Detection,” IEEE Signal Processing Letters, vol. 28, pp. 937–941, 2021, doi: 10.1109/lsp.2021.3076358.
  11. J. Boyd, M. Fahim, and O. Olukoya, “Voice spoofing detection for multiclass attack classification using deep learning,” Machine Learning with Applications, vol. 14, p. 100503, Dec. 2023, doi: 10.1016/j.mlwa.2023.100503.
  12. “A Multiclass Attack Classification Framework for IoT Using Hybrid Deep Learning Model,” Journal of Cybersecurity and Information Management, vol. 15, no. 1, 2025, doi: 10.54216/jcim.150112.
  13. A. Javed, K. M. Malik, A. Irtaza, and H. Malik, “Towards protecting cyber-physical and IoT systems from single- and multi-order voice spoofing attacks,” Applied Acoustics, vol. 183, p. 108283, Dec. 2021, doi: 10.1016/j.apacoust.2021.108283.
  14. M. Alam and I. R. Khan, “Cyber-physical Attacks and IoT,” Intelligent Cyber-Physical Systems Security for Industry 4.0, pp. 79–104, Nov. 2022, doi: 10.1201/9781003241348-5.
  15. U. Ghosh, P. Chatterjee, S. S. Shetty, C. Kamhoua, and L. Njilla, “Towards Secure Software-Defined Networking Integrated Cyber-Physical Systems: Attacks and Countermeasures,” Cybersecurity and Privacy in Cyber-Physical Systems, pp. 103–132, May 2019, doi: 10.1201/9780429263897-6.
  16. “Protecting a Network from Spoofing and Denial of Service Attacks,” Network Design, pp. 659–666, May 2000, doi: 10.1201/9781420093759-58.
  17. A. A. Alsulami and S. Zein-Sabatto, “Resilient Cyber-Security Approach For Aviation Cyber-Physical Systems Protection Against Sensor Spoofing Attacks,” 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0565–0571, Jan. 2021, doi: 10.1109/ccwc51732.2021.9376158.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: RKR, TT; Methodology: RKR, TT; Software: RKR; Data Curation: TT; Writing- Original Draft Preparation: RKR, TT; Visualization: TT; Supervision: TT; Validation: RKR, TT; Writing- Reviewing and Editing: RKR, TT; Writing- Original Draft: TT; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


We would like to thank Reviewers for taking the time and effort necessary to review the manuscript. We sincerely appreciate all valuable comments and suggestions, which helped us to improve the quality of the manuscript.


Funding


No funding was received for conducting this research.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.

Corresponding author

Electrical and Computer Science Engineering, University of Windsor, Windsor, ON N9B 3P4, Canada.

Rahul Kumar Ravichandran

Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Rahul Kumar Ravichandran and Thamaraimanalan T, "Enhanced Adversarial Spectro Phonetic Learning for Robust Voice Spoof Detection Using VCC 2022 Dataset", Journal of Future Networks and Communications, vol.1, no.1, pp. 041-050, January 2025. doi: XXXX/XXXX/JFNC202501005.


Copyright


© 2025 Rahul Kumar Ravichandran and Thamaraimanalan T. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.