Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations

Wanying Ge,Jose Patino,Massimiliano Todisco,Nicholas Evans
2024-04-26
Abstract:Substantial progress in spoofing and deepfake detection has been made in recent years. Nonetheless, the community has yet to make notable inroads in providing an explanation for how a classifier produces its output. The dominance of black box spoofing detection solutions is at further odds with the drive toward trustworthy, explainable artificial intelligence. This paper describes our use of SHapley Additive exPlanations (SHAP) to gain new insights in spoofing detection. We demonstrate use of the tool in revealing unexpected classifier behaviour, the artefacts that contribute most to classifier outputs and differences in the behaviour of competing spoofing detection models. The tool is both efficient and flexible, being readily applicable to a host of different architecture models in addition to related, different applications. All results reported in the paper are reproducible using open-source software.
Audio and Speech Processing
What problem does this paper attempt to address?
The paper aims to address the following issues: 1. **Explaining the behavior of black-box models**: Despite significant progress in spoofing and deepfake detection in recent years, there is still a lack of effective methods to explain how classifiers generate output results. Researchers hope to use Shapley Additive Explanations (SHAP) to reveal the behavior of different spoofing detection models, unexpected classifier behaviors, and the main artifacts affecting classifier outputs. 2. **Enhancing interpretability**: With the trend of explainable artificial intelligence (xAI), researchers aim not only to increase the trustworthiness of machine learning models but also to help researchers better understand the problems themselves and the characteristics, behaviors, advantages, and disadvantages of different solutions through interpretability tools, thereby guiding future research directions. 3. **Analyzing the difficulty of specific attacks**: Researchers want to understand why certain spoofing attacks are more difficult to detect than others, such as the A17 attack in the ASVspoof 2019 database, and explore why systems that directly handle raw waveform inputs perform better in some cases compared to systems based on handcrafted spectral representations. 4. **Evaluating the contribution of non-speech intervals**: Existing literature reports that some solutions focus more on non-speech intervals rather than speech intervals. Researchers hope to further understand through SHAP analysis whether this phenomenon is related to database design flaws or reflects the behavioral characteristics of certain specific countermeasures. In summary, the goal of this paper is to enhance the understanding of the behavior of deep neural networks in spoofing and deepfake detection tasks by applying SHAP tools, thereby promoting the development of more reliable, efficient, and transparent machine learning solutions.