Voice conversion and spoofing attack on speaker verification systems

@article{Wu2013VoiceCA,
  title={Voice conversion and spoofing attack on speaker verification systems},
  author={Zhizheng Wu and Haizhou Li},
  journal={2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference},
  year={2013},
  pages={1-9}
}
Speaker verification system automatically accepts or rejects the claimed identity of a speaker. Recently, we have made major progress in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major concern when deploying speaker verification technology is whether a system is robust against spoofing attacks. Speaker verification studies provided us a better insight into speaker characterization, which has contributed to… CONTINUE READING

Figures, Tables, Results, and Topics from this paper.

Key Quantitative Results

  • The experiments conducted on NIST SRE 2005 database show that the equal error rate (EER) is increased from around 10% to over 60% when all the impostor samples are converted towards the genuine speaker.

Citations

Publications citing this paper.
SHOWING 1-10 OF 29 CITATIONS

Group Latent Embedding for Vector Quantized Variational Autoencoder in Non-Parallel Voice Conversion

Shaojin Ding, Ricardo Gutierrez-Osuna
  • INTERSPEECH 2019
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

Quantifying the Breakability of Voice Assistants

  • 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

Performing a Presentation Attack Detection on Voice Biometrics

  • 2018 International Carnahan Conference on Security Technology (ICCST)
  • 2018
VIEW 2 EXCERPTS
CITES BACKGROUND

SRVoice: A Robust Sparse Representation-Based Liveness Detection System

  • 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 82 REFERENCES

A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case

Zhizheng Wu, Tomi Kinnunen, Eng Siong Chng, Haizhou Li, Eliathamby Ambikairajah
  • Asia-Pacific Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012, pp. 1–5.
  • 2012
VIEW 13 EXCERPTS
HIGHLY INFLUENTIAL

On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals

  • 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO)
  • 2012
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech

  • 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
  • 2012
VIEW 7 EXCERPTS