Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference
نویسندگان
چکیده
Speaker verification system has gained great popularity in recent years, especially with the development of deep neural networks and Internet Things. However, security speaker based on not been well investigated. In this paper, we propose an attack to spoof state-of-the-art generalized end-to-end (GE2E) loss function for misclassifying illegal users into authentic user. Specifically, design a novel deploy generator generating effective adversarial examples slight perturbation then these achieve our goals. The success rate can reach 82% when cosine similarity is adopted deep-learning-based system. Beyond that, experiments also reported signal-to-noise ratio at 76 dB, which proves that higher imperceptibility than previous works. summary, results show only neural-network-based but more importantly ability hide from human hearing or machine discrimination.
منابع مشابه
Fooling End-to-end Speaker Verification by Adversarial Examples
Automatic speaker verification systems are increasingly used as the primary means to authenticate costumers. Recently, it has been proposed to train speaker verification systems using end-to-end deep neural models. In this paper, we show that such systems are vulnerable to adversarial example attacks. Adversarial examples are generated by adding a peculiar noise to original speaker examples, in...
متن کاملSpoofing and countermeasures for automatic speaker verification
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work...
متن کاملAnti-spoofing Methods for Automatic Speaker Verification System
Growing interest in automatic speaker verification (ASV) systems has lead to significant quality improvement of spoofing attacks on them. Many research works confirm that despite the low equal error rate (EER) ASV systems are still vulnerable to spoofing attacks. In this work we overview different acoustic feature spaces and classifiers to determine reliable and robust countermeasures against s...
متن کاملSpeaker Recognition Anti-spoofing
Progress in the development of spoofing countermeasures for automatic speaker recognition is less advanced than equivalent work related to other biometric modalities. This chapter outlines the potential for even state-of-the-art automatic speaker recognition systems to be spoofed. While the use of a multitude of different datasets, protocols and metrics complicates the meaningful comparison of ...
متن کاملIntroducing i-vectors for joint anti-spoofing and speaker verification
Any biometric recognizer is vulnerable to direct spoofing attacks and automatic speaker verification (ASV) is no exception; replay, synthesis and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks. Most existing countermeasures use full knowledge of a particular VC system to detect spoofing. We study a potentially more uni...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/6664578