Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech
Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks...
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/98757 http://hdl.handle.net/10220/13414 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-98757 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-987572020-05-28T07:41:42Z Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech Kinnunen, Tomi Wu, Zhizheng Lee, Kong Aik Sedlak, Filip Chng, Eng Siong Li, Haizhou School of Computer Engineering IEEE International Conference on Acoustics, Speech and Signal Processing (2012 : Kyoto, Japan) DRNTU::Engineering::Computer science and engineering Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks using telephone speech. We implemented a voice conversion systems with two types of features and nonparallel frame alignment methods and five speaker verification systems ranging from simple Gaussian mixture models (GMMs) to state-of-the-art joint factor analysis (JFA) recognizer. Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks. But even it experiences more than 5-fold increase in the false acceptance rate from 3.24 % to 17.33 %. 2013-09-09T07:33:32Z 2019-12-06T19:59:22Z 2013-09-09T07:33:32Z 2019-12-06T19:59:22Z 2012 2012 Conference Paper https://hdl.handle.net/10356/98757 http://hdl.handle.net/10220/13414 10.1109/ICASSP.2012.6288895 en © 2012 IEEE |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Kinnunen, Tomi Wu, Zhizheng Lee, Kong Aik Sedlak, Filip Chng, Eng Siong Li, Haizhou Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech |
description |
Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks using telephone speech. We implemented a voice conversion systems with two types of features and nonparallel frame alignment methods and five speaker verification systems ranging from simple Gaussian mixture models (GMMs) to state-of-the-art joint factor analysis (JFA) recognizer. Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks. But even it experiences more than 5-fold increase in the false acceptance rate from 3.24 % to 17.33 %. |
author2 |
School of Computer Engineering |
author_facet |
School of Computer Engineering Kinnunen, Tomi Wu, Zhizheng Lee, Kong Aik Sedlak, Filip Chng, Eng Siong Li, Haizhou |
format |
Conference or Workshop Item |
author |
Kinnunen, Tomi Wu, Zhizheng Lee, Kong Aik Sedlak, Filip Chng, Eng Siong Li, Haizhou |
author_sort |
Kinnunen, Tomi |
title |
Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech |
title_short |
Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech |
title_full |
Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech |
title_fullStr |
Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech |
title_full_unstemmed |
Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech |
title_sort |
vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech |
publishDate |
2013 |
url |
https://hdl.handle.net/10356/98757 http://hdl.handle.net/10220/13414 |
_version_ |
1681056160286769152 |