Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech

Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks...

Full description

Saved in:
Bibliographic Details
Main Authors: Kinnunen, Tomi, Wu, Zhizheng, Lee, Kong Aik, Sedlak, Filip, Chng, Eng Siong, Li, Haizhou
Other Authors: School of Computer Engineering
Format: Conference or Workshop Item
Language:English
Published: 2013
Subjects:
Online Access:https://hdl.handle.net/10356/98757
http://hdl.handle.net/10220/13414
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-98757
record_format dspace
spelling sg-ntu-dr.10356-987572020-05-28T07:41:42Z Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech Kinnunen, Tomi Wu, Zhizheng Lee, Kong Aik Sedlak, Filip Chng, Eng Siong Li, Haizhou School of Computer Engineering IEEE International Conference on Acoustics, Speech and Signal Processing (2012 : Kyoto, Japan) DRNTU::Engineering::Computer science and engineering Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks using telephone speech. We implemented a voice conversion systems with two types of features and nonparallel frame alignment methods and five speaker verification systems ranging from simple Gaussian mixture models (GMMs) to state-of-the-art joint factor analysis (JFA) recognizer. Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks. But even it experiences more than 5-fold increase in the false acceptance rate from 3.24 % to 17.33 %. 2013-09-09T07:33:32Z 2019-12-06T19:59:22Z 2013-09-09T07:33:32Z 2019-12-06T19:59:22Z 2012 2012 Conference Paper https://hdl.handle.net/10356/98757 http://hdl.handle.net/10220/13414 10.1109/ICASSP.2012.6288895 en © 2012 IEEE
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering
spellingShingle DRNTU::Engineering::Computer science and engineering
Kinnunen, Tomi
Wu, Zhizheng
Lee, Kong Aik
Sedlak, Filip
Chng, Eng Siong
Li, Haizhou
Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech
description Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks using telephone speech. We implemented a voice conversion systems with two types of features and nonparallel frame alignment methods and five speaker verification systems ranging from simple Gaussian mixture models (GMMs) to state-of-the-art joint factor analysis (JFA) recognizer. Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks. But even it experiences more than 5-fold increase in the false acceptance rate from 3.24 % to 17.33 %.
author2 School of Computer Engineering
author_facet School of Computer Engineering
Kinnunen, Tomi
Wu, Zhizheng
Lee, Kong Aik
Sedlak, Filip
Chng, Eng Siong
Li, Haizhou
format Conference or Workshop Item
author Kinnunen, Tomi
Wu, Zhizheng
Lee, Kong Aik
Sedlak, Filip
Chng, Eng Siong
Li, Haizhou
author_sort Kinnunen, Tomi
title Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech
title_short Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech
title_full Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech
title_fullStr Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech
title_full_unstemmed Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech
title_sort vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech
publishDate 2013
url https://hdl.handle.net/10356/98757
http://hdl.handle.net/10220/13414
_version_ 1681056160286769152