Skip to main content

Detecting Replay Attacks from Far-Field Recordings on Speaker Verification Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 6583))

Abstract

In this paper, we describe a system for detecting spoofing attacks on speaker verification systems. By spoofing we mean an attempt to impersonate a legitimate user. We focus on detecting if the test segment is a far-field microphone recording of the victim. This kind of attack is of critical importance in security applications like access to bank accounts. We present experiments on databases created for this purpose, including land line and GSM telephone channels. We present spoofing detection results with EER between 0% and 9% depending on the condition. We show the degradation on the speaker verification performance in the presence of this kind of attack and how to use the spoofing detection to mitigate that degradation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Reynolds, D.A., Quatieri, T.F., Dunn, R.B.: Speaker Verification Using Adapted Gaussian Mixture Models. Digital Signal Processing 10(1-3), 19–41 (2000)

    Article  Google Scholar 

  2. Kenny, P., Ouellet, P., Dehak, N., Gupta, V., Dumouchel, P.: A Study of Interspeaker Variability in Speaker Verification. IEEE Transactions on Audio, Speech, and Language Processing 16(5), 980–988 (2008)

    Article  Google Scholar 

  3. http://www.itl.nist.gov/iad/mig/tests/sre/2010/NIST_SRE10_evalplan.r6.pdf

  4. Perrot, P., Aversano, G., Chollet, G.: Voice disguise and automatic detection: review and perspectives. Lecture Notes In Computer Science, pp. 101–117 (2007)

    Google Scholar 

  5. Perrot, P., Aversano, G., Blouet, R., Charbit, M., Chollet, G.: Voice Forgery Using ALISP: Indexation in a Client Memory. In: Proceedings (ICASSP 2005). IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 17–20. IEEE, Los Alamitos (2005)

    Chapter  Google Scholar 

  6. De Leon, P.L., Pucher, M., Yamagishi, J.: Evaluation of the vulnerability of speaker verification to synthetic speech. In: Proceedings of Odyssey 2010 - The Speaker and Language Recognition Workshop, Brno, Czech Republic (2010)

    Google Scholar 

  7. Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001)

    Google Scholar 

  8. Pelecanos, J., Sridharan, S.: Feature warping for robust speaker verification. In: Oddyssey Speaker and Language Recognition Workshop, Crete, Greece (2001)

    Google Scholar 

  9. Glembek, O., Burget, L., Dehak, N., Brummer, N., Kenny, P.: Comparison of scoring methods used in speaker recognition with Joint Factor Analysis. In: ICASSP 2009: Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, Washington, DC, USA, 2009, pp. 4057–4060. IEEE Computer Society, Los Alamitos (2009)

    Google Scholar 

  10. Brummer, N.: http://sites.google.com/site/nikobrummer/focalbilinear

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Villalba, J., Lleida, E. (2011). Detecting Replay Attacks from Far-Field Recordings on Speaker Verification Systems. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds) Biometrics and ID Management. BioID 2011. Lecture Notes in Computer Science, vol 6583. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19530-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19530-3_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19529-7

  • Online ISBN: 978-3-642-19530-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics