Abstract
This paper explores the robustness of a text-independent voice verification system against different methods of spoofing attacks based on speech synthesis and voice conversion techniques. Our experiments show that spoofing attacks based on the speech synthesis are most dangerous, but the use of standard TV-JFA approach based spoofing detection module can reduce the False Acceptance error rate of the whole speaker recognition system from 80 % to 1 %.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shchemelinin, V., Simonchik, K.: Examining vulnerability of voice verification systems to spoofing attacks by means of a TTS system. In: Železný, M., Habernal, I., Ronzhin, A. (eds.) SPECOM 2013. LNCS, vol. 8113, pp. 132–137. Springer, Heidelberg (2013)
Shchemelinin, V., Topchina, M., Simonchik, K.: Vulnerability of voice verification systems to spoofing attacks by TTS voices based on automatically labeled telephone speech. In: Ronzhin, A., Potapova, R., Delic, V. (eds.) SPECOM 2014. LNCS, vol. 8773, pp. 475–481. Springer, Heidelberg (2014)
Aleinik, S., Matveev, Y.N.: Detection of clipped fragments in speech signals. Int. J. Electr. Electron. Sci. Eng. 8(2), 74–80 (2014)
Kenny, P.: Bayesian speaker verification with heavy tailed priors. In: Proceedings of the Odyssey Speaker and Language Recognition Workshop (2010)
Simonchik, K., Pekhovsky T., Shulipa, A., Afanasyev, A.: Supervized mixture of PLDA models for cross-channel speaker verification. In: Proceedings of the 13th Annual Conference of the International Speech Communication Association, Interspeech 2012 (2012)
Matveev, Yu., Simonchik, K.: The speaker identification system for the NIST SRE 2010. In: Proceedings of the 20th International Conference on Computer Graphics and Vision, GraphiCon 2010, pp. 315–319 (2010)
Kozlov, A., Kudashev, O., Matveev, Y., Pekhovsky, T., Simonchik, K., Shulipa, A.: SVID speaker recognition system for NIST SRE 2012. In: Železný, M., Habernal, I., Ronzhin, A. (eds.) SPECOM 2013. LNCS, vol. 8113, pp. 278–285. Springer, Heidelberg (2013)
Wu, Z., et al.: ASVspoof 2015: Automatic Speaker Verification Spoofing and Countermeasures Challenge Evaluation Plan, Training, 10(15), 3750 (2014). http://www.spoofingchallenge.org
Novoselov, S., Pekhovsky, T., Simonchik, K.: STC speaker recognition system for the NIST i-Vector challenge. In: Proceedings of Odyssey 2014 - The Speaker and Language Recognition Workshop (2014)
Kinnunen, T., Li, H.: An overview of text-independent speaker recognition: from features to supervectors. Speech Commun. 52, 12–40 (2010)
Wu, Z., et al.: ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge (2015). http://www.spoofingchallenge.org/is2015_asvspoof.pdf
Dutoit, T., et al.: Towards a voice conversion system based on frame selection. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2007)
Wu, Z., et al.: Exemplarbased unit selection for voice conversion utilizing temporal information. In: Interspeech (2013)
Fukada, T., Tokuda, K., Kobayashi, T., Imai, S.: An adaptive algorithm for mel-cepstral analysis of speech. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (1992)
Yamagishi, J., et al.: Analysis of speaker adaptation algorithms for HMM-based speech synthesis and a constrained smaplr adaptation algorithm. IEEE Trans. Audio Speech Lang. Process. 17(1), 66–83 (2009)
Festvox project. http://festvox.org/
Novoselov, S., et al.: STC Anti-spoofing Systems for the ASVspoof 2015 Challenge. http://ris.ifmo.ru/wp-content/uploads/2015/06/Technical_report_ASVspoof2015_STC.pdf
BOSARIS Toolkit. https://sites.google.com/site/bosaristoolkit/
Acknowledgments
This work was partially financially supported by the Government of Russian Federation, Grant 074-U01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Shchemelinin, V., Kozlov, A., Lavrentyeva, G., Novoselov, S., Simonchik, K. (2015). Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks. In: Ronzhin, A., Potapova, R., Fakotakis, N. (eds) Speech and Computer. SPECOM 2015. Lecture Notes in Computer Science(), vol 9319. Springer, Cham. https://doi.org/10.1007/978-3-319-23132-7_59
Download citation
DOI: https://doi.org/10.1007/978-3-319-23132-7_59
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23131-0
Online ISBN: 978-3-319-23132-7
eBook Packages: Computer ScienceComputer Science (R0)