Title :
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
Author :
Kinnunen, Tomi ; Wu, Zhi-Zheng ; Lee, Kong Aik ; Sedlak, Filip ; Chng, Eng Siong ; Li, Haizhou
Author_Institution :
Sch. of Comput., Univ. of Eastern Finland (UEF), Joensuu, Finland
Abstract :
Voice conversion - the methodology of automatically converting one´s utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks using telephone speech. We implemented a voice conversion systems with two types of features and nonparallel frame alignment methods and five speaker verification systems ranging from simple Gaussian mixture models (GMMs) to state-of-the-art joint factor analysis (JFA) recognizer. Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks. But even it experiences more than 5-fold increase in the false acceptance rate from 3.24 % to 17.33 %.
Keywords :
Gaussian processes; security of data; speaker recognition; telephone sets; GMM; Gaussian mixture model; JFA method; JFA recognizer; joint factor analysis; nonparallel frame alignment method; sound utterance; telephone speech; text-independent speaker verification system vulnerability; voice conversion spoofing attack; voice conversion system; Adaptation models; Joints; NIST; Speech; Support vector machines; Training; Vectors; security; speaker verification; voice conversion;
Conference_Titel :
Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on
Conference_Location :
Kyoto
Print_ISBN :
978-1-4673-0045-2
Electronic_ISBN :
1520-6149
DOI :
10.1109/ICASSP.2012.6288895