I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry

نویسندگان

  • Rosa González Hautamäki
  • Tomi Kinnunen
  • Ville Hautamäki
  • Timo Leino
  • Anne-Maria Laukkanen
چکیده

Voice imitation is mimicry of another speaker’s voice characteristics and speech behavior. Professional voice mimicry can create entertaining, yet realistic sounding target speaker renditions. As mimicry tends to exaggerate prosodic, idiosyncratic and lexical behavior, it is unclear how modern spectral-feature automatic speaker verification systems respond to mimicry “attacks”. We study the vulnerability of two well-known speaker recognition systems, traditional Gaussian mixture model – universal background model (GMM-UBM) and a state-of-the-art i-vector classifier with cosine scoring. The material consists of one professional Finnish imitator impersonating five wellknown Finnish public figures. In a carefully controlled setting, mimicry attack does slightly increase the false acceptance rate for the i-vector system, but generally this is not alarmingly large in comparison to voice conversion or playback attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Testing Voice Mimicry with the YOHO Speaker Verification Corpus

The aim of this paper is to determine how vulnerable a speaker verification system is to conscious effort by impostors to mimic a client of the system. The paper explores systematically how much closer an impostor can get to another speaker’s voice by repeated attempts. Experiments on 138 speakers in the YOHO database and six people who played a role as imitators showed a fact that professional...

متن کامل

Crowdsourcing Attacks on Biometric Systems

We introduce a new approach for attacking and analyzing biometric-based authentication systems, which involves crowdsourcing the search for potential impostors to the system. Our focus is on voice-based authentication, or speaker verification (SV), and we propose a generic method to use crowdsourcing for identifying candidate “mimics” for speakers in a given target population. We then conduct a...

متن کامل

Comparison of Human Listeners and Speaker Verification Systems Using Voice Mimicry Data

In this work, we compare the performance of human listeners and two well known speaker verification systems in presence of voice mimicry. Our focus is to gain insights on how well human listeners recognize speakers when mimicry data is included and compare it to the overall performance of state-ofthe-art speaker verification systems, a traditional Gaussian mixture model-universal background mod...

متن کامل

Automatic versus human speaker verification: The case of voice mimicry

In this work, we compare the performance of three modern speaker verification systems and non-expert human listeners in the presence of voice mimicry. Our goal is to gain insights on how vulnerable speaker verification systems are to mimicry attack and compare it to the performance of human listeners. We study both traditional Gaussian mixture model-universal background model (GMM-UBM) and an i...

متن کامل

Security evaluation of i-vector based speaker verification systems against hill-climbing attacks

This work studies the vulnerabilities of i-vector based speaker verification systems against indirect attacks. Particularly, we exploit the one-to-one representation of speakers via their corresponding i-vectors to perform Hill-Climbing based attacks; under the hypothesis that the inherent low-dimensionality of ivectors might represent a potential security breach to fraudulently access the syst...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013