Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference

نویسندگان

چکیده

Speaker verification system has gained great popularity in recent years, especially with the development of deep neural networks and Internet Things. However, security speaker based on not been well investigated. In this paper, we propose an attack to spoof state-of-the-art generalized end-to-end (GE2E) loss function for misclassifying illegal users into authentic user. Specifically, design a novel deploy generator generating effective adversarial examples slight perturbation then these achieve our goals. The success rate can reach 82% when cosine similarity is adopted deep-learning-based system. Beyond that, experiments also reported signal-to-noise ratio at 76 dB, which proves that higher imperceptibility than previous works. summary, results show only neural-network-based but more importantly ability hide from human hearing or machine discrimination.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fooling End-to-end Speaker Verification by Adversarial Examples

Automatic speaker verification systems are increasingly used as the primary means to authenticate costumers. Recently, it has been proposed to train speaker verification systems using end-to-end deep neural models. In this paper, we show that such systems are vulnerable to adversarial example attacks. Adversarial examples are generated by adding a peculiar noise to original speaker examples, in...

متن کامل

Spoofing and countermeasures for automatic speaker verification

It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work...

متن کامل

Anti-spoofing Methods for Automatic Speaker Verification System

Growing interest in automatic speaker verification (ASV) systems has lead to significant quality improvement of spoofing attacks on them. Many research works confirm that despite the low equal error rate (EER) ASV systems are still vulnerable to spoofing attacks. In this work we overview different acoustic feature spaces and classifiers to determine reliable and robust countermeasures against s...

متن کامل

Speaker Recognition Anti-spoofing

Progress in the development of spoofing countermeasures for automatic speaker recognition is less advanced than equivalent work related to other biometric modalities. This chapter outlines the potential for even state-of-the-art automatic speaker recognition systems to be spoofed. While the use of a multitude of different datasets, protocols and metrics complicates the meaningful comparison of ...

متن کامل

Introducing i-vectors for joint anti-spoofing and speaker verification

Any biometric recognizer is vulnerable to direct spoofing attacks and automatic speaker verification (ASV) is no exception; replay, synthesis and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks. Most existing countermeasures use full knowledge of a particular VC system to detect spoofing. We study a potentially more uni...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2021

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2021/6664578