Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems

09/12/2018
by   Fuming Fang, et al.
0

Automatic speaker verification (ASV) systems use a playback detector to filter out playback attacks and ensure verification reliability. Since current playback detection models are almost always trained using genuine and played-back speech, it may be possible to degrade their performance by transforming the acoustic characteristics of the played-back speech close to that of the genuine speech. One way to do this is to enhance speech "stolen" from the target speaker before playback. We tested the effectiveness of a playback attack using this method by using the speech enhancement generative adversarial network to transform acoustic characteristics. Experimental results showed that use of this "enhanced stolen speech" method significantly increases the equal error rates for the baseline used in the ASVspoof 2017 challenge and for a light convolutional neural network-based method. The results also showed that its use degrades the performance of a Gaussian mixture model-universal background model-based ASV system. This type of attack is thus an urgent problem needing to be solved.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/31/2018

Wasserstein GAN and Waveform Loss-based Acoustic Model Training for Multi-speaker Text-to-Speech Synthesis Systems Using a WaveNet Vocoder

Recent neural networks such as WaveNet and sampleRNN that learn directly...
research
10/10/2016

Investigation of Synthetic Speech Detection Using Frame- and Segment-Specific Importance Weighting

Speaker verification systems are vulnerable to spoofing attacks which pr...
research
03/05/2022

Language vs Speaker Change: A Comparative Study

Spoken language change detection (LCD) refers to detecting language swit...
research
07/24/2015

The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge

Many existing speaker verification systems are reported to be vulnerable...
research
10/21/2021

Optimizing Multi-Taper Features for Deep Speaker Verification

Multi-taper estimators provide low-variance power spectrum estimates tha...
research
06/13/2023

Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems

We present Malafide, a universal adversarial attack against automatic sp...

Please sign up or login with your details

Forgot password? Click here to reset