Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints
نویسندگان
چکیده
Voice conversion, a technique to change one’s voice to sound like that of another, poses a threat to even high performance speaker verification system. Vulnerability of text-independent speaker verification systems under spoofing attack, using statistical voice conversion technique, was evaluated and confirmed in our previous work. In this paper, we further extend the study to text-dependent speaker verification systems. In particular, we compare both joint density Gaussian mixture model (JD-GMM) and unit-selection (US) spoofing methods and, for the first time, the performances of text-independent and text-dependent speaker verification systems in a single study. We conduct the experiments using RSR2015 database which is recorded using multiple mobile devices. The experimental results indicate that text-dependent speaker verification system tolerates spoofing attacks better than the text-independent counterpart.
منابع مشابه
Voice transformation-based spoofing of text-dependent speaker verification systems
In the past few years state-of-the-art text-dependent speaker verification technology has improved significantly in terms of the ability to accept target speakers and reject imposters. As a result, the use of speaker verification systems for real world security is increasing. Real world usage of speaker verification technology raises the issue of spoofing attacks. As part of our efforts for dev...
متن کاملVoice conversion versus speaker verification: an overview
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based on a speech sample. Recently, a major progress was made in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major concern when deploying speaker verification technology is whether a system is robust against spoofing...
متن کاملJoint Speaker Verification and Antispoofing in the i-Vector Space
Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), is no exception; replay, synthesis and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks considered as one of the most challenging for modern recognition systems. To detect spoofing, most...
متن کاملAnti-spooofing: Speaker verification vs. voice conversion
Voice conversion (VC) techniques, which modify a speaker’s voice to sound like another’s, present a threat to automatic speaker verification (SV) systems. In this paper, we evaluate the vulnerability of a state-of-the-art SV system against a converted speech spoofing attack. To overcome the spoofing attack, we implement state-of-the-art converted speech detectors based on shortand long-term fea...
متن کاملAnti-spoofing, Voice Conversion
Voice conversion is a process which converts or transforms one speaker’s voice towards that of another. The literature shows that voice conversion can be used to spoof or fool an automatic speaker verification system. State-of-the-art voice conversion algorithms can produce high-quality speech signals in real time and are capable of fooling both human listeners and automatic systems, including ...
متن کامل