A study on replay attack and anti-spoofing for text-dependent speaker verification

@article{Wu2014ASO,
  title={A study on replay attack and anti-spoofing for text-dependent speaker verification},
  author={Zhizheng Wu and Sheng Gao and Eng Siong Cling and Haizhou Li},
  journal={Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific},
  year={2014},
  pages={1-5}
}
  • Zhizheng Wu, Sheng Gao, +1 author Haizhou Li
  • Published 1 December 2014
  • Computer Science
  • Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific
Replay, which is to playback a pre-recorded speech sample, presents a genuine risk to automatic speaker verification technology. In this study, we evaluate the vulnerability of text-dependent speaker verification systems under the replay attack using a standard benchmarking database, and also propose an anti-spoofing technique to safeguard the speaker verification systems. The key idea of the spoofing detection technique is to decide whether the presented sample is matched to any previous… Expand
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
TLDR
Experiments show that low-effort replay attacks present at least a comparable threat to speech synthesis and voice conversion, and a relatively new approach based on the local binary pattern analysis of speech spectrograms is shown to outperform a competing approach based upon the detection of far-field recordings. Expand
Countermeasure to handle replay attacks in practical speaker verification systems
TLDR
A novel countermeasure is found to handle the replay attacks of speaker verification (SV) system to replay based spoofing attacks in an impressive manner based on creation of average spectral bitmap for live and record speech. Expand
On the vulnerability of speaker verification to realistic voice spoofing
TLDR
The voice spoofing data-set of AVspoof, a public audio-visual spoofing database, is introduced and a set of experimental results that show the effect of such attacks on current state-of-the-art ASV systems are provided. Expand
On the study of replay and voice conversion attacks to text-dependent speaker verification
TLDR
This work conducts a systematic analysis of text-dependent ASV systems to replay and voice conversion attacks using the same protocol and database, in particular the RSR2015 database which represents mobile device quality speech. Expand
A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
TLDR
This study investigates a major difficulty in replay detection: the over-fitting problem caused by variability factors in speech signal, and an F-ratio probing tool is proposed and three variability factors are investigated using this tool: speaker identity, speech content and playback & recording device. Expand
Anti-Spoofing for Text-Independent Speaker Verification: An Initial Database, Comparison of Countermeasures, and Human Performance
TLDR
This paper starts with a thorough analysis of the spoofing effects of five speech synthesis and eight voice conversion systems, and the vulnerability of three speaker verification systems under those attacks, and introduces a number of countermeasures to prevent spoofing attacks. Expand
RedDots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research
TLDR
A new database designed to support the development of replay spoofing countermeasures tailored towards the protection of text-dependent ASV systems from replay attacks in the face of variable recording and playback conditions, derived from the re-recording of the original RedDots database. Expand
A Survey on Replay Attack Detection for Automatic Speaker Verification (ASV) System
  • H. Patil, Madhu R. Kamble
  • Computer Science
  • 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)
  • 2018
TLDR
An overview of the replay attack focusing on 2nd ASVspoof 2017 challenge is provided to provide critical analysis of state-of-the-art techniques, various countermeasures, databases, and also aims to present current limitations along with road map ahead in this technological challenging problem. Expand
Combining Phase-based Features for Replay Spoof Detection System
TLDR
The relative significance of various phase-based features for detecting replay attacks is explored and the magnitude-based Features are chosen to perform score-level fusion with phase- based features to capture the possible complementary information. Expand
Audio Replay Attack Detection in Automated Speaker Verification
TLDR
The paper describes a generalized system capable to detection of replay, based on the recently introduced Constant Q Transform (CQT), a perceptually mapped frequency-time analysis tool mainly used with audio samples. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 29 REFERENCES
Preventing replay attacks on speaker verification systems
TLDR
A system for detecting spoofing attacks on speaker verification systems and shows the degradation on the speaker verification performance in the presence of this kind of attack and how to use the spoofing detection to mitigate that degradation. Expand
Re-assessing the threat of replay spoofing attacks against automatic speaker verification
TLDR
Results show that low-effort replay attacks provoke higher levels of false acceptance than comparatively higher-efforts spoofing attacks such as voice conversion and speech synthesis, showing the need to refocus research effort and to develop countermeasures against replay attacks in future work. Expand
A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case
TLDR
To reduce false acceptance rate caused by spoofing attack, a general anti-spoofing attack framework is proposed for the speaker verification systems, where a converted speech detector is adopted as a post-processing module for the Speaker verification system's acceptance decision. Expand
Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints
TLDR
Both joint density Gaussian mixture model (JD-GMM) and unit-selection (US) spoofing methods are compared and, for the first time, the performances of text-independent and text-dependent speaker verification systems are compared in a single study. Expand
Voice conversion and spoofing attack on speaker verification systems
  • Zhizheng Wu, Haizhou Li
  • Computer Science
  • 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference
  • 2013
TLDR
An overview of recent spoofing attacks under different conditions with a focus on voice conversion spoofing attack is given and anti-spoofing attack measures for speaker verification are discussed. Expand
Detecting Replay Attacks from Far-Field Recordings on Speaker Verification Systems
TLDR
A system for detecting spoofing attacks on speaker verification systems and shows the degradation on the speaker verification performance in the presence of this kind of attack and how to use the spoofing detection to mitigate that degradation. Expand
Voice transformation-based spoofing of text-dependent speaker verification systems
TLDR
This paper describes in this paper a spoofing attack based on simple voice transformation and reports an analysis of the vulnerability of several state-of-the-art text-dependent algorithms to such an attack. Expand
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
TLDR
Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks, but even it experiences more than 5-fold increase in the false acceptance rate. Expand
Vulnerability in speaker verification - a study of technical impostor techniques
TLDR
This paper reported on some ways to try to deceive a state-of-the-art speaker verification (SV) system and defined a worst case scenario where the impostor has extensive knowledge about the person to deceive as well as the system to attack. Expand
Spoofing countermeasures to protect automatic speaker verification from voice conversion
TLDR
A new countermeasure is presented for the protection of automatic speaker verification systems from spoofed, converted voice signals that exploits the common shift applied to the spectral slope of consecutive speech frames involved in the mapping of a spoofer's voice signal towards a statistical model of a given target. Expand
...
1
2
3
...