HM-Conformer: A Conformer-based audio deepfake detection system with hierarchical pooling and multi-level classification token aggregation methods

Audio deepfake detection (ADD) is the task of detecting spoofing attacks generated by text-to-speech or voice conversion systems. Spoofing evidence, which helps to distinguish between spoofed and bona-fide utterances, might exist either locally or globally in the input features. To capture these, th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2023-09
Hauptverfasser: Hyun-seo, Shin, Heo, Jungwoo, Ju-ho, Kim, Chan-yeong, Lim, Kim, Wonbin, Ha-Jin, Yu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Hyun-seo, Shin
Heo, Jungwoo
Ju-ho, Kim
Chan-yeong, Lim
Kim, Wonbin
Ha-Jin, Yu
description Audio deepfake detection (ADD) is the task of detecting spoofing attacks generated by text-to-speech or voice conversion systems. Spoofing evidence, which helps to distinguish between spoofed and bona-fide utterances, might exist either locally or globally in the input features. To capture these, the Conformer, which consists of Transformers and CNN, possesses a suitable structure. However, since the Conformer was designed for sequence-to-sequence tasks, its direct application to ADD tasks may be sub-optimal. To tackle this limitation, we propose HM-Conformer by adopting two components: (1) Hierarchical pooling method progressively reducing the sequence length to eliminate duplicated information (2) Multi-level classification token aggregation method utilizing classification tokens to gather information from different blocks. Owing to these components, HM-Conformer can efficiently detect spoofing evidence by processing various sequence lengths and aggregating them. In experimental results on the ASVspoof 2021 Deepfake dataset, HM-Conformer achieved a 15.71% EER, showing competitive performance compared to recent systems.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2865944288</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2865944288</sourcerecordid><originalsourceid>FETCH-proquest_journals_28659442883</originalsourceid><addsrcrecordid>eNqNi89Kw0AQxhehYLF9hwHPC3GT1OhNiqUXb72XaXaSbLvZiTsbi6_hExu09NzT9-_33am5yfMnXRXG3KulyDHLMrN6NmWZz9XP9kOvOTQce4qv8AbXoA8oZAFH6xgs0dDgiSaTqE6OA8i3JOrh7FIHnaOIse5cjR4GZu9CCxgs9KNPTnv6Ig-1RxHXTMzfP_GJAmDbRmr_m55Sx1YWatagF1pe9EE9bt53660eIn-OJGl_5DGGadqbalW-FIWpqvw26hfUMVhw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2865944288</pqid></control><display><type>article</type><title>HM-Conformer: A Conformer-based audio deepfake detection system with hierarchical pooling and multi-level classification token aggregation methods</title><source>Free E- Journals</source><creator>Hyun-seo, Shin ; Heo, Jungwoo ; Ju-ho, Kim ; Chan-yeong, Lim ; Kim, Wonbin ; Ha-Jin, Yu</creator><creatorcontrib>Hyun-seo, Shin ; Heo, Jungwoo ; Ju-ho, Kim ; Chan-yeong, Lim ; Kim, Wonbin ; Ha-Jin, Yu</creatorcontrib><description>Audio deepfake detection (ADD) is the task of detecting spoofing attacks generated by text-to-speech or voice conversion systems. Spoofing evidence, which helps to distinguish between spoofed and bona-fide utterances, might exist either locally or globally in the input features. To capture these, the Conformer, which consists of Transformers and CNN, possesses a suitable structure. However, since the Conformer was designed for sequence-to-sequence tasks, its direct application to ADD tasks may be sub-optimal. To tackle this limitation, we propose HM-Conformer by adopting two components: (1) Hierarchical pooling method progressively reducing the sequence length to eliminate duplicated information (2) Multi-level classification token aggregation method utilizing classification tokens to gather information from different blocks. Owing to these components, HM-Conformer can efficiently detect spoofing evidence by processing various sequence lengths and aggregating them. In experimental results on the ASVspoof 2021 Deepfake dataset, HM-Conformer achieved a 15.71% EER, showing competitive performance compared to recent systems.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Classification ; Deception ; Speech recognition ; Spoofing</subject><ispartof>arXiv.org, 2023-09</ispartof><rights>2023. This work is published under http://creativecommons.org/publicdomain/zero/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,780</link.rule.ids></links><search><creatorcontrib>Hyun-seo, Shin</creatorcontrib><creatorcontrib>Heo, Jungwoo</creatorcontrib><creatorcontrib>Ju-ho, Kim</creatorcontrib><creatorcontrib>Chan-yeong, Lim</creatorcontrib><creatorcontrib>Kim, Wonbin</creatorcontrib><creatorcontrib>Ha-Jin, Yu</creatorcontrib><title>HM-Conformer: A Conformer-based audio deepfake detection system with hierarchical pooling and multi-level classification token aggregation methods</title><title>arXiv.org</title><description>Audio deepfake detection (ADD) is the task of detecting spoofing attacks generated by text-to-speech or voice conversion systems. Spoofing evidence, which helps to distinguish between spoofed and bona-fide utterances, might exist either locally or globally in the input features. To capture these, the Conformer, which consists of Transformers and CNN, possesses a suitable structure. However, since the Conformer was designed for sequence-to-sequence tasks, its direct application to ADD tasks may be sub-optimal. To tackle this limitation, we propose HM-Conformer by adopting two components: (1) Hierarchical pooling method progressively reducing the sequence length to eliminate duplicated information (2) Multi-level classification token aggregation method utilizing classification tokens to gather information from different blocks. Owing to these components, HM-Conformer can efficiently detect spoofing evidence by processing various sequence lengths and aggregating them. In experimental results on the ASVspoof 2021 Deepfake dataset, HM-Conformer achieved a 15.71% EER, showing competitive performance compared to recent systems.</description><subject>Classification</subject><subject>Deception</subject><subject>Speech recognition</subject><subject>Spoofing</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNqNi89Kw0AQxhehYLF9hwHPC3GT1OhNiqUXb72XaXaSbLvZiTsbi6_hExu09NzT9-_33am5yfMnXRXG3KulyDHLMrN6NmWZz9XP9kOvOTQce4qv8AbXoA8oZAFH6xgs0dDgiSaTqE6OA8i3JOrh7FIHnaOIse5cjR4GZu9CCxgs9KNPTnv6Ig-1RxHXTMzfP_GJAmDbRmr_m55Sx1YWatagF1pe9EE9bt53660eIn-OJGl_5DGGadqbalW-FIWpqvw26hfUMVhw</recordid><startdate>20230915</startdate><enddate>20230915</enddate><creator>Hyun-seo, Shin</creator><creator>Heo, Jungwoo</creator><creator>Ju-ho, Kim</creator><creator>Chan-yeong, Lim</creator><creator>Kim, Wonbin</creator><creator>Ha-Jin, Yu</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope></search><sort><creationdate>20230915</creationdate><title>HM-Conformer: A Conformer-based audio deepfake detection system with hierarchical pooling and multi-level classification token aggregation methods</title><author>Hyun-seo, Shin ; Heo, Jungwoo ; Ju-ho, Kim ; Chan-yeong, Lim ; Kim, Wonbin ; Ha-Jin, Yu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_28659442883</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Classification</topic><topic>Deception</topic><topic>Speech recognition</topic><topic>Spoofing</topic><toplevel>online_resources</toplevel><creatorcontrib>Hyun-seo, Shin</creatorcontrib><creatorcontrib>Heo, Jungwoo</creatorcontrib><creatorcontrib>Ju-ho, Kim</creatorcontrib><creatorcontrib>Chan-yeong, Lim</creatorcontrib><creatorcontrib>Kim, Wonbin</creatorcontrib><creatorcontrib>Ha-Jin, Yu</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hyun-seo, Shin</au><au>Heo, Jungwoo</au><au>Ju-ho, Kim</au><au>Chan-yeong, Lim</au><au>Kim, Wonbin</au><au>Ha-Jin, Yu</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>HM-Conformer: A Conformer-based audio deepfake detection system with hierarchical pooling and multi-level classification token aggregation methods</atitle><jtitle>arXiv.org</jtitle><date>2023-09-15</date><risdate>2023</risdate><eissn>2331-8422</eissn><abstract>Audio deepfake detection (ADD) is the task of detecting spoofing attacks generated by text-to-speech or voice conversion systems. Spoofing evidence, which helps to distinguish between spoofed and bona-fide utterances, might exist either locally or globally in the input features. To capture these, the Conformer, which consists of Transformers and CNN, possesses a suitable structure. However, since the Conformer was designed for sequence-to-sequence tasks, its direct application to ADD tasks may be sub-optimal. To tackle this limitation, we propose HM-Conformer by adopting two components: (1) Hierarchical pooling method progressively reducing the sequence length to eliminate duplicated information (2) Multi-level classification token aggregation method utilizing classification tokens to gather information from different blocks. Owing to these components, HM-Conformer can efficiently detect spoofing evidence by processing various sequence lengths and aggregating them. In experimental results on the ASVspoof 2021 Deepfake dataset, HM-Conformer achieved a 15.71% EER, showing competitive performance compared to recent systems.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2023-09
issn 2331-8422
language eng
recordid cdi_proquest_journals_2865944288
source Free E- Journals
subjects Classification
Deception
Speech recognition
Spoofing
title HM-Conformer: A Conformer-based audio deepfake detection system with hierarchical pooling and multi-level classification token aggregation methods
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T17%3A39%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=HM-Conformer:%20A%20Conformer-based%20audio%20deepfake%20detection%20system%20with%20hierarchical%20pooling%20and%20multi-level%20classification%20token%20aggregation%20methods&rft.jtitle=arXiv.org&rft.au=Hyun-seo,%20Shin&rft.date=2023-09-15&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2865944288%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2865944288&rft_id=info:pmid/&rfr_iscdi=true