Attacking Speaker Recognition With Deep Generative Models

01/08/2018
by   Wilson Cai, et al.
0

In this paper we investigate the ability of generative adversarial networks (GANs) to synthesize spoofing attacks on modern speaker recognition systems. We first show that samples generated with SampleRNN and WaveNet are unable to fool a CNN-based speaker recognition system. We propose a modification of the Wasserstein GAN objective function to make use of data that is real but not from the class being learned. Our semi-supervised learning method is able to perform both targeted and untargeted attacks, raising questions related to security in speaker authentication systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/29/2019

Spoofing Speaker Verification Systems with Deep Multi-speaker Text-to-speech Synthesis

This paper proposes a deep multi-speaker text-to-speech (TTS) model for ...
research
12/07/2017

Semi-Supervised Learning with IPM-based GANs: an Empirical Study

We present an empirical investigation of a recent class of Generative Ad...
research
10/10/2016

Generative Adversarial Nets from a Density Ratio Estimation Perspective

Generative adversarial networks (GANs) are successful deep generative mo...
research
03/21/2023

Linking generative semi-supervised learning and generative open-set recognition

This study investigates the relationship between semi-supervised learnin...
research
03/09/2022

Machine Learning in NextG Networks via Generative Adversarial Networks

Generative Adversarial Networks (GANs) are Machine Learning (ML) algorit...
research
08/03/2021

The Devil is in the GAN: Defending Deep Generative Models Against Backdoor Attacks

Deep Generative Models (DGMs) allow users to synthesize data from comple...

Please sign up or login with your details

Forgot password? Click here to reset