Spoofing Attacker Also Benefits from Self-Supervised Pretrained Model

05/24/2023
by   Aoi Ito, et al.
0

Large-scale pretrained models using self-supervised learning have reportedly improved the performance of speech anti-spoofing. However, the attacker side may also make use of such models. Also, since it is very expensive to train such models from scratch, pretrained models on the Internet are often used, but the attacker and defender may possibly use the same pretrained model. This paper investigates whether the improvement in anti-spoofing with pretrained models holds under the condition that the models are available to attackers. As the attacker, we train a model that enhances spoofed utterances so that the speaker embedding extractor based on the pretrained models cannot distinguish between bona fide and spoofed utterances. Experimental results show that the gains the anti-spoofing models obtained by using the pretrained models almost disappear if the attacker also makes use of the pretrained models.

READ FULL TEXT
research
04/01/2019

ASSERT: Anti-Spoofing with Squeeze-Excitation and Residual neTworks

We present JHU's system submission to the ASVspoof 2019 Challenge: Anti-...
research
09/12/2023

Can large-scale vocoded spoofed data improve speech spoofing countermeasure with a self-supervised front end?

A speech spoofing countermeasure (CM) that discriminates between unseen ...
research
04/12/2019

KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures

Email breaches are commonplace, and they expose a wealth of personal, bu...
research
06/05/2020

Defense for Black-box Attacks on Anti-spoofing Models by Self-Supervised Learning

High-performance anti-spoofing models for automatic speaker verification...
research
07/04/2023

Pretraining Conformer with ASR or ASV for Anti-Spoofing Countermeasure

This paper introduces the Multi-scale Feature Aggregation Conformer (MFA...
research
11/17/2017

Towards the Adoption of Anti-spoofing Protocols for Email Systems

Email spoofing is a critical step of phishing, where the attacker impers...
research
02/15/2022

Don't stop the training: continuously-updating self-supervised algorithms best account for auditory responses in the cortex

Over the last decade, numerous studies have shown that deep neural netwo...

Please sign up or login with your details

Forgot password? Click here to reset