Title :
Evaluation of wolf attack for classified target on speaker verification systems
Author :
Ohki, T. ; Hidano, S. ; Takehisa, T.
Author_Institution :
Res. Inst. for Sci. & Eng., Waseda Univ., Tokyo, Japan
Abstract :
Impersonation attack is one of the major security issues of biometric authentication systems. Wolf attacks use a biometric sample such that the similarities between this sample and a number of templates are resulting in high false matches with these templates. In the conventional evaluation with the wolf attack probability (WAP), wolf attacks took advantage of vulnerabilities on the specific matching algorithms, and thereby high WAPs were achieved. However, in actual biometric authentication systems, their algorithm will be black boxes, and artificial samples will be refused by someones´s observation or liveness detection; therefore, wolf attacks do not always have theoretical WAPs. We focus on speaker verification systems, and propose a wolf attack that does not depend on matching algorithms and in which people cannot guess whether wolves are artifacts or not. Additionally, we show that the wolf attack became more efficient by creating a wolf for each gender.
Keywords :
biometrics (access control); cryptography; probability; speaker recognition; WAP; biometric authentication systems; classified target; impersonation attack; security issues; speaker verification systems; wolf attack probability; Authentication; Feature extraction; Speech; Speech processing; Vectors; Wireless application protocol;
Conference_Titel :
Control Automation Robotics & Vision (ICARCV), 2012 12th International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
978-1-4673-1871-6
Electronic_ISBN :
978-1-4673-1870-9
DOI :
10.1109/ICARCV.2012.6485155