{"id":"https://openalex.org/W4416798941","doi":"https://doi.org/10.1109/apsipaasc65261.2025.11249340","title":"ArcticEcho: A Novel Speaker-Controlled Voice Cloning Dataset for Modern Deepfake Detection Benchmarking","display_name":"ArcticEcho: A Novel Speaker-Controlled Voice Cloning Dataset for Modern Deepfake Detection Benchmarking","publication_year":2025,"publication_date":"2025-10-22","ids":{"openalex":"https://openalex.org/W4416798941","doi":"https://doi.org/10.1109/apsipaasc65261.2025.11249340"},"language":null,"primary_location":{"id":"doi:10.1109/apsipaasc65261.2025.11249340","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc65261.2025.11249340","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008092267","display_name":"Soumik Gangopadhyay","orcid":"https://orcid.org/0000-0003-4115-472X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Soham Gangopadhyay","raw_affiliation_strings":["Amity University Uttar Pradesh,India"],"affiliations":[{"raw_affiliation_string":"Amity University Uttar Pradesh,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065774206","display_name":"Inderpreet Singh","orcid":"https://orcid.org/0000-0003-3697-5275"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Inderpreet Singh","raw_affiliation_strings":["Amity University Uttar Pradesh,India"],"affiliations":[{"raw_affiliation_string":"Amity University Uttar Pradesh,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006404776","display_name":"Pankita H. Pandya","orcid":"https://orcid.org/0000-0002-2021-5821"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Prateek Pandya","raw_affiliation_strings":["Amity University Uttar Pradesh,India"],"affiliations":[{"raw_affiliation_string":"Amity University Uttar Pradesh,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013190044","display_name":"Ashish Mani","orcid":"https://orcid.org/0000-0002-2312-1185"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ashish Mani","raw_affiliation_strings":["Amity University Uttar Pradesh,India"],"affiliations":[{"raw_affiliation_string":"Amity University Uttar Pradesh,India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048591673","display_name":"Sumit Goswami","orcid":"https://orcid.org/0000-0002-3158-6505"},"institutions":[{"id":"https://openalex.org/I1340206300","display_name":"Defence Research and Development Organisation","ror":"https://ror.org/05k37v296","country_code":"IN","type":"government","lineage":["https://openalex.org/I1340206300","https://openalex.org/I4210150591"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sumit Goswami","raw_affiliation_strings":["Defence Research and Development Organization (DRDO),India"],"affiliations":[{"raw_affiliation_string":"Defence Research and Development Organization (DRDO),India","institution_ids":["https://openalex.org/I1340206300"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5008092267"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20713016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2235","last_page":"2240"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.6949999928474426,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.6949999928474426,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.12380000203847885,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.04019999876618385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.8450999855995178},{"id":"https://openalex.org/keywords/cloning","display_name":"Cloning (programming)","score":0.7860000133514404},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5871999859809875},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5181999802589417},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.43639999628067017},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.39640000462532043}],"concepts":[{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.8450999855995178},{"id":"https://openalex.org/C121050878","wikidata":"https://www.wikidata.org/wiki/Q5135020","display_name":"Cloning (programming)","level":2,"score":0.7860000133514404},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7197999954223633},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5871999859809875},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5181999802589417},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45829999446868896},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4562999904155731},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.43639999628067017},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.39640000462532043},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.35589998960494995},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33329999446868896},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.32910001277923584},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3077000081539154},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.25619998574256897},{"id":"https://openalex.org/C63000827","wikidata":"https://www.wikidata.org/wiki/Q3080428","display_name":"Software portability","level":2,"score":0.2533999979496002}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apsipaasc65261.2025.11249340","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc65261.2025.11249340","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2936802426","https://openalex.org/W2989571531","https://openalex.org/W3015645837","https://openalex.org/W3016970897","https://openalex.org/W3026777299","https://openalex.org/W3196475561","https://openalex.org/W3197358873","https://openalex.org/W4297841787","https://openalex.org/W4312743281","https://openalex.org/W4381198892","https://openalex.org/W4402351686","https://openalex.org/W4403955716","https://openalex.org/W4408598195","https://openalex.org/W4408799803"],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"advancement":[2],"of":[3,12,190],"voice":[4,44,59,89,100,183],"cloning":[5,45,60,90,101,184],"technologies":[6,102],"has":[7],"fundamentally":[8],"altered":[9],"the":[10,177,188],"landscape":[11],"audio":[13,107,197],"deepfake":[14],"detection,":[15],"yet":[16],"existing":[17],"benchmarks":[18],"have":[19],"not":[20],"evolved":[21],"to":[22,36,86,103,187],"reflect":[23],"this":[24,49],"reality.":[25],"Current":[26],"datasets":[27,160],"inadvertently":[28],"introduce":[29,52],"confounding":[30,64],"variables":[31,65],"that":[32,62,142,174],"enable":[33],"detection":[34,84,153,193],"models":[35,85,116,129],"exploit":[37],"dataset-specific":[38],"artifacts":[39],"rather":[40,92],"than":[41,93],"learn":[42],"genuine":[43],"signatures.":[46],"To":[47],"address":[48],"challenge,":[50],"we":[51],"ArcticEcho,":[53],"a":[54,118,169],"novel":[55],"speakercontrolled":[56],"English":[57],"language":[58],"dataset":[61,97],"eliminates":[63],"through":[66],"rigorous":[67],"experimental":[68],"design.":[69],"By":[70],"maintaining":[71],"strict":[72],"correspondence":[73],"between":[74],"real":[75],"and":[76,80,117],"synthetic":[77,165],"au-dio-identical":[78],"speakers":[79],"identical":[81],"content-ArcticEcho":[82],"forces":[83],"identify":[87],"authentic":[88],"characteristics":[91],"incidental":[94],"artifacts.":[95],"Our":[96,139],"leverages":[98],"state-of-the-art":[99],"create":[104],"24,752":[105],"high-quality":[106],"samples":[108],"across":[109,136],"18":[110],"speakers.":[111],"Comprehensive":[112],"evaluation":[113,172],"on":[114,158],"baseline":[115],"SOTA":[119],"deep-learning":[120],"NF-ResNeXt":[121],"model":[122],"reveals":[123],"significant":[124],"cross-dataset":[125],"generalization":[126],"gaps,":[127],"with":[128,163,181],"experiencing":[130],"substantial":[131],"performance":[132,157],"degradation":[133],"when":[134],"tested":[135],"different":[137],"benchmarks.":[138],"findings":[140],"suggest":[141],"current":[143],"benchmarking":[144],"approaches":[145],"may":[146],"inadequately":[147],"assess":[148],"real-world":[149],"deployment":[150],"readiness,":[151],"as":[152],"systems":[154],"achieving":[155],"near-perfect":[156],"traditional":[159],"can":[161],"struggle":[162],"highquality":[164],"speech.":[166],"ArcticEcho":[167],"provides":[168],"more":[170,191],"realistic":[171],"framework":[173],"better":[175],"represents":[176],"challenges":[178],"practitioners":[179],"face":[180],"sophisticated":[182],"attacks,":[185],"contributing":[186],"development":[189],"robust":[192],"methods":[194],"for":[195],"modern":[196],"security":[198],"applications.":[199]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-28T00:00:00"}
