• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Scopus
  4. ASVspoof 5: Design, collection and validation of resources for spoofing, deepfake, and adversarial attack detection using crowdsourced speech
 
  • Details
  • Full
Options
2026
Journal Article
Title

ASVspoof 5: Design, collection and validation of resources for spoofing, deepfake, and adversarial attack detection using crowdsourced speech

Abstract
ASVspoof 5 is the fifth edition in a series of challenges which promote the study of speech spoofing and deepfake attacks as well as the design of detection solutions. We introduce the ASVspoof 5 database which is generated in a crowdsourced fashion from data collected in diverse acoustic conditions (cf. studio-quality data for earlier ASVspoof databases) and from ∼2000 speakers (cf. ∼100 earlier). The database contains attacks generated with 32 different algorithms, also crowdsourced, and optimised to varying degrees using new surrogate detection models. Among them are attacks generated with a mix of legacy and contemporary text-to-speech synthesis and voice conversion models, in addition to adversarial attacks which are incorporated for the first time. ASVspoof 5 protocols comprise seven speaker-disjoint partitions. They include two distinct partitions for the training of different sets of attack models, two more for the development and evaluation of surrogate detection models, and then three additional partitions which comprise the ASVspoof 5 training, development and evaluation sets. An auxiliary set of data collected from an additional 30k speakers can also be used to train speaker encoders for the implementation of attack algorithms. Also described herein is an experimental validation of the new ASVspoof 5 database using a set of automatic speaker verification and spoof/deepfake baseline detectors. With the exception of protocols and tools for the generation of spoofed/deepfake speech, the resources described in this paper, already used by participants of the ASVspoof 5 challenge in 2024, are now all freely available to the community.
Author(s)
Wang, Xin
Research Organization of Information and Systems National Institute of Informatics
Delgado, Héctor
Microsoft Corporation
Tak, Hemlata
Pindrop
Jung, Jee-Weon
Carnegie Mellon University
Shim, Hye-Jin
Carnegie Mellon University
Todisco, Massimiliano
EURECOM
Kukanov, Ivan
KLASS Engineering and Solutions
Liu, Xuechen
Research Organization of Information and Systems National Institute of Informatics
Sahidullah, Md
Institute for Advancing Intelligence
Kinnunen, Tomi
University of Eastern Finland
Evans, Nicholas
EURECOM
Lee, Kong Aik
The Hong Kong Polytechnic University
Yamagishi, Junichi
Research Organization of Information and Systems National Institute of Informatics
Jeong, Myeonghun
Seoul National University
Zhu, Ge
University of Rochester
Zang, Yongyi
University of Rochester
Zhang, You
University of Rochester
Maiti, Soumi
Carnegie Mellon University
Lux, Florian
Universität Stuttgart
Müller, Nicolas
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Zhang, Wangyou
Shanghai Jiao Tong University
Sun, Chengzhe
University at Buffalo, The State University of New York
Hou, Shuwei
University at Buffalo, The State University of New York
Lyu, Siwei
University at Buffalo, The State University of New York
Le Maguer, Sébastien
Helsingin Yliopisto
Gong, Cheng
Tianjin University
Guo, Hanjie
University of Science and Technology of China
Chen, Liping
University of Science and Technology of China
Singh, Vishwanath
University of Eastern Finland
Journal
Computer speech and language  
Open Access
File(s)
Download (7.58 MB)
Rights
CC BY 4.0: Creative Commons Attribution
DOI
10.1016/j.csl.2025.101825
10.24406/publica-5466
Additional link
Full text
Language
English
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Keyword(s)
  • ASVspoof

  • Corpus design

  • Countermeasures

  • Deepfakes

  • Presentation attack detection

  • Spoofing

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024