11
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems

      Preprint
      , , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Automatic speaker verification (ASV) systems use a playback detector to filter out playback attacks and ensure verification reliability. Since current playback detection models are almost always trained using genuine and played-back speech, it may be possible to degrade their performance by transforming the acoustic characteristics of the played-back speech close to that of the genuine speech. One way to do this is to enhance speech "stolen" from the target speaker before playback. We tested the effectiveness of a playback attack using this method by using the speech enhancement generative adversarial network to transform acoustic characteristics. Experimental results showed that use of this "enhanced stolen speech" method significantly increases the equal error rates for the baseline used in the ASVspoof 2017 challenge and for a light convolutional neural network-based method. The results also showed that its use degrades the performance of a Gaussian mixture model-universal background model-based ASV system. This type of attack is thus an urgent problem needing to be solved.

          Related collections

          Most cited references20

          • Record: found
          • Abstract: not found
          • Article: not found

          Support vector machines

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Front-End Factor Analysis for Speaker Verification

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Speaker Verification Using Adapted Gaussian Mixture Models

                Bookmark

                Author and article information

                Journal
                12 September 2018
                Article
                1809.04274
                69fca034-d05b-430d-8c49-77735fadc8f7

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                IEEE International Workshop on Information Forensics and Security (WIFS), 2018
                Accepted at WIFS2018
                cs.SD cs.CR eess.AS

                Security & Cryptology,Electrical engineering,Graphics & Multimedia design
                Security & Cryptology, Electrical engineering, Graphics & Multimedia design

                Comments

                Comment on this article