On the study of replay and voice conversion attacks to text-dependent speaker verification

被引:37
|
作者
Wu, Zhizheng [1 ]
Li, Haizhou [2 ]
机构
[1] Univ Edinburgh, CSTR, Edinburgh, Midlothian, Scotland
[2] Inst Infocomm Res, Human Language Technol Dept, Singapore, Singapore
关键词
Speaker verification; Spoofing attack; Replay; Voice conversion; Security; RECOGNITION; SECURITY; ADAPTATION;
D O I
10.1007/s11042-015-3080-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automatic speaker verification (ASV) is to automatically accept or reject a claimed identity based on a speech sample. Recently, individual studies have confirmed the vulnerability of state-of-the-art text-independent ASV systems under replay, speech synthesis and voice conversion attacks on various databases. However, the behaviours of text-dependent ASV systems have not been systematically assessed in the face of various spoofing attacks. In this work, we first conduct a systematic analysis of text-dependent ASV systems to replay and voice conversion attacks using the same protocol and database, in particular the RSR2015 database which represents mobile device quality speech. We then analyse the interplay of voice conversion and speaker verification by linking the voice conversion objective evaluation measures with the speaker verification error rates to take a look at the vulnerabilities from the perspective of voice conversion.
引用
收藏
页码:5311 / 5327
页数:17
相关论文
共 50 条
  • [1] On the study of replay and voice conversion attacks to text-dependent speaker verification
    Zhizheng Wu
    Haizhou Li
    [J]. Multimedia Tools and Applications, 2016, 75 : 5311 - 5327
  • [2] A study on replay attack and anti-spoofing for text-dependent speaker verification
    Wu, Zhizheng
    Gao, Sheng
    Chng, Eng Siong
    Li, Haizhou
    [J]. 2014 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2014,
  • [3] Voice Transformation-based Spoofing of Text-Dependent Speaker Verification Systems
    Kons, Zvi
    Aronowitz, Hagai
    [J]. 14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5, 2013, : 945 - 949
  • [4] Text-Dependent Speaker Verification System: A Review
    Debnath, Saswati
    Soni, B.
    Baruah, U.
    Sah, D. K.
    [J]. PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [5] Deep feature for text-dependent speaker verification
    Liu, Yuan
    Qian, Yanmin
    Chen, Nanxin
    Fu, Tianfan
    Zhang, Ya
    Yu, Kai
    [J]. SPEECH COMMUNICATION, 2015, 73 : 1 - 13
  • [6] Bidirectional Attention for Text-Dependent Speaker Verification
    Fang, Xin
    Gao, Tian
    Zou, Liang
    Ling, Zhenhua
    [J]. SENSORS, 2020, 20 (23) : 1 - 17
  • [7] Robust Methods for Text-Dependent Speaker Verification
    Bhukya, Ramesh K.
    Prasanna, S. R. Mahadeva
    Sarma, Biswajit Dev
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2019, 38 (11) : 5253 - 5288
  • [8] Content Normalization for Text-dependent Speaker Verification
    Dey, Subhadeep
    Madikeri, Srikanth
    Motlicek, Petr
    Ferras, Marc
    [J]. 18TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2017), VOLS 1-6: SITUATED INTERACTION, 2017, : 1482 - 1486
  • [9] IMPOSTURE CLASSIFICATION FOR TEXT-DEPENDENT SPEAKER VERIFICATION
    Larcher, Anthony
    Lee, Kong Aik
    Ma, Bin
    Li, Haizhou
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [10] Robust Methods for Text-Dependent Speaker Verification
    Ramesh K. Bhukya
    S. R. Mahadeva Prasanna
    Biswajit Dev Sarma
    [J]. Circuits, Systems, and Signal Processing, 2019, 38 : 5253 - 5288