On the potential threat of using large speech corpora for impostor selection in speaker verification
نویسندگان
چکیده
In order to evaluate the risk in SV systems one should take into account the possible perpetrator who knows whom he/she is attacking. This paper thus evaluated if a large speech corpus can be used for selecting impostors to use against a speaker verification (SV) system. We tested the possibility by selecting the most similar speakers from a large corpus and then using the recordings in this corpus for impostor attempts against clients in an SV system. Speech samples of the clients uttering words not used in the SV service was used in order to search the large corpus for similar speakers. Recordings of utterances used in the SV service was then collected from these similar speakers and used for impostor attempts. Our conclusion is that this scenario is a threat that needs to be considered by providers of SV systems.
منابع مشابه
Speaker verification score normalization using speaker model clusters
Among the various proposed score normalizations, Tand Z-norm are most widely used in speaker verification systems. The main idea in these normalizations is to reduce the variations in impostor scores in order to improve accuracy. These normalizations require selection of a set of cohort models or utterances in order to estimate the impostor score distribution. In this paper we investigate basin...
متن کاملImproved GMM-based speaker verification using SVM-driven impostor dataset selection
The problem of impostor dataset selection for GMM-based speaker verification is addressed through the recently proposed data-driven background dataset refinement technique. The SVM-based refinement technique selects from a candidate impostor dataset those examples that are most frequently selected as support vectors when training a set of SVMs on a development corpus. This study demonstrates th...
متن کاملNoise Clustering Approach to Speaker Verification
In a speaker veri ̄cation system, a claimed speaker's score is computed to accept or reject the speaker claim. Most of the current methods compute the score as the ratio of the claimed speaker's and the impostors' likelihood functions. Based on analysing false acceptance error obtained by using these methods, we propose a noise clustering approach to ̄nd better scores which can reduce that error....
متن کاملAnalysing the performance of Speaker Verification task using different features pdfkeywords=Mel Frequency Cepstral Coefficient(MFCC), Linear Predictive Cepstral Coefficient(LPCC), Perceptual Linear Predictive(PLP), Equal Error Rate(EER)
Speaker recognition is the identification of the person who is speaking by characteristics of their voices, also called “voice recognition”. The components of Speaker Recognition includes Speaker Identification(SI) and Speaker Verification(SV). Speaker identification is the task of determining an unknown speakers identity. If the speaker claims to be of a certain identity and the voice is to ve...
متن کاملSpeaker Adaptation in Continuous Speech Recognition Using MLLR-Based MAP Estimation
A variety of methods are used for speaker adaptation in speech recognition. In some techniques, such as MAP estimation, only the models with available training data are updated. Hence, large amounts of training data are required in order to have significant recognition improvements. In some others, such as MLLR, where several general transformations are applied to model clusters, the results ar...
متن کامل