Skip to main content

Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks

  • Conference paper
  • First Online:
Speech and Computer (SPECOM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9319))

Included in the following conference series:

  • 1598 Accesses

Abstract

This paper explores the robustness of a text-independent voice verification system against different methods of spoofing attacks based on speech synthesis and voice conversion techniques. Our experiments show that spoofing attacks based on the speech synthesis are most dangerous, but the use of standard TV-JFA approach based spoofing detection module can reduce the False Acceptance error rate of the whole speaker recognition system from 80 % to 1 %.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shchemelinin, V., Simonchik, K.: Examining vulnerability of voice verification systems to spoofing attacks by means of a TTS system. In: Železný, M., Habernal, I., Ronzhin, A. (eds.) SPECOM 2013. LNCS, vol. 8113, pp. 132–137. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  2. Shchemelinin, V., Topchina, M., Simonchik, K.: Vulnerability of voice verification systems to spoofing attacks by TTS voices based on automatically labeled telephone speech. In: Ronzhin, A., Potapova, R., Delic, V. (eds.) SPECOM 2014. LNCS, vol. 8773, pp. 475–481. Springer, Heidelberg (2014)

    Google Scholar 

  3. Aleinik, S., Matveev, Y.N.: Detection of clipped fragments in speech signals. Int. J. Electr. Electron. Sci. Eng. 8(2), 74–80 (2014)

    Google Scholar 

  4. Kenny, P.: Bayesian speaker verification with heavy tailed priors. In: Proceedings of the Odyssey Speaker and Language Recognition Workshop (2010)

    Google Scholar 

  5. Simonchik, K., Pekhovsky T., Shulipa, A., Afanasyev, A.: Supervized mixture of PLDA models for cross-channel speaker verification. In: Proceedings of the 13th Annual Conference of the International Speech Communication Association, Interspeech 2012 (2012)

    Google Scholar 

  6. Matveev, Yu., Simonchik, K.: The speaker identification system for the NIST SRE 2010. In: Proceedings of the 20th International Conference on Computer Graphics and Vision, GraphiCon 2010, pp. 315–319 (2010)

    Google Scholar 

  7. Kozlov, A., Kudashev, O., Matveev, Y., Pekhovsky, T., Simonchik, K., Shulipa, A.: SVID speaker recognition system for NIST SRE 2012. In: Železný, M., Habernal, I., Ronzhin, A. (eds.) SPECOM 2013. LNCS, vol. 8113, pp. 278–285. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  8. Wu, Z., et al.: ASVspoof 2015: Automatic Speaker Verification Spoofing and Countermeasures Challenge Evaluation Plan, Training, 10(15), 3750 (2014). http://www.spoofingchallenge.org

  9. Novoselov, S., Pekhovsky, T., Simonchik, K.: STC speaker recognition system for the NIST i-Vector challenge. In: Proceedings of Odyssey 2014 - The Speaker and Language Recognition Workshop (2014)

    Google Scholar 

  10. Kinnunen, T., Li, H.: An overview of text-independent speaker recognition: from features to supervectors. Speech Commun. 52, 12–40 (2010)

    Article  Google Scholar 

  11. Wu, Z., et al.: ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge (2015). http://www.spoofingchallenge.org/is2015_asvspoof.pdf

  12. Dutoit, T., et al.: Towards a voice conversion system based on frame selection. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2007)

    Google Scholar 

  13. Wu, Z., et al.: Exemplarbased unit selection for voice conversion utilizing temporal information. In: Interspeech (2013)

    Google Scholar 

  14. Fukada, T., Tokuda, K., Kobayashi, T., Imai, S.: An adaptive algorithm for mel-cepstral analysis of speech. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (1992)

    Google Scholar 

  15. Yamagishi, J., et al.: Analysis of speaker adaptation algorithms for HMM-based speech synthesis and a constrained smaplr adaptation algorithm. IEEE Trans. Audio Speech Lang. Process. 17(1), 66–83 (2009)

    Article  Google Scholar 

  16. Festvox project. http://festvox.org/

  17. Novoselov, S., et al.: STC Anti-spoofing Systems for the ASVspoof 2015 Challenge. http://ris.ifmo.ru/wp-content/uploads/2015/06/Technical_report_ASVspoof2015_STC.pdf

  18. BOSARIS Toolkit. https://sites.google.com/site/bosaristoolkit/

Download references

Acknowledgments

This work was partially financially supported by the Government of Russian Federation, Grant 074-U01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vadim Shchemelinin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Shchemelinin, V., Kozlov, A., Lavrentyeva, G., Novoselov, S., Simonchik, K. (2015). Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks. In: Ronzhin, A., Potapova, R., Fakotakis, N. (eds) Speech and Computer. SPECOM 2015. Lecture Notes in Computer Science(), vol 9319. Springer, Cham. https://doi.org/10.1007/978-3-319-23132-7_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23132-7_59

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23131-0

  • Online ISBN: 978-3-319-23132-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics