Voice transformation-based spoofing of text-dependent speaker verification systems
نویسندگان
چکیده
In the past few years state-of-the-art text-dependent speaker verification technology has improved significantly in terms of the ability to accept target speakers and reject imposters. As a result, the use of speaker verification systems for real world security is increasing. Real world usage of speaker verification technology raises the issue of spoofing attacks. As part of our efforts for developing countermeasures for such attacks, we describe in this paper a spoofing attack based on simple voice transformation and report an analysis of the vulnerability of several state-of-the-art text-dependent algorithms to such an attack.
منابع مشابه
Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints
Voice conversion, a technique to change one’s voice to sound like that of another, poses a threat to even high performance speaker verification system. Vulnerability of text-independent speaker verification systems under spoofing attack, using statistical voice conversion technique, was evaluated and confirmed in our previous work. In this paper, we further extend the study to text-dependent sp...
متن کاملVoice conversion versus speaker verification: an overview
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based on a speech sample. Recently, a major progress was made in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major concern when deploying speaker verification technology is whether a system is robust against spoofing...
متن کاملAnti-spoofing, Voice Conversion
Voice conversion is a process which converts or transforms one speaker’s voice towards that of another. The literature shows that voice conversion can be used to spoof or fool an automatic speaker verification system. State-of-the-art voice conversion algorithms can produce high-quality speech signals in real time and are capable of fooling both human listeners and automatic systems, including ...
متن کامل"STC spoofing" database for text-dependent speaker recognition evaluation
The paper describes the “STC Spoofing” database, which consists of a set of recordings of “live” speech by several speakers, as well as synthesized speech fragments obtained using a TTS engine based on these speakers’ voices. The database can be used for testing the robustness of textdependent speaker verification systems against spoofing attacks, as well as for research and development of meth...
متن کاملA new speaker verification spoofing countermeasure based on local binary patterns
This paper presents a new countermeasure for the protection of automatic speaker verification systems from spoofed, converted voice signals. The new countermeasure is based on the analysis of a sequence of acoustic feature vectors using Local Binary Patterns (LBPs). Compared to existing approaches the new countermeasure is less reliant on prior knowledge and affords robust protection from not o...
متن کامل