DocumentCode :
81096
Title :
Joint Speaker Verification and Antispoofing in the i -Vector Space
Author :
Sizov, Aleksandr ; Khoury, Elie ; Kinnunen, Tomi ; Zhizheng Wu ; Marcel, Sebastien
Author_Institution :
Sch. of Comput., Univ. of Eastern Finland, Joensuu, Finland
Volume :
10
Issue :
4
fYear :
2015
fDate :
Apr-15
Firstpage :
821
Lastpage :
832
Abstract :
Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), is no exception; replay, synthesis, and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks considered as one of the most challenging for modern recognition systems. To detect spoofing, most existing countermeasures assume explicit or implicit knowledge of a particular VC system and focus on designing discriminative features. In this paper, we explore back-end generative models for more generalized countermeasures. In particular, we model synthesis-channel subspace to perform speaker verification and antispoofing jointly in the {i} -vector space, which is a well-established technique for speaker modeling. It enables us to integrate speaker verification and antispoofing tasks into one system without any fusion techniques. To validate the proposed approach, we study vocoder-matched and vocoder-mismatched ASV and VC spoofing detection on the NIST 2006 speaker recognition evaluation data set. Promising results are obtained for standalone countermeasures as well as their combination with ASV systems using score fusion and joint approach.
Keywords :
biometrics (access control); speaker recognition; ASV systems; NIST 2006 speaker recognition evaluation data set; VC attacks; VC spoofing detection; VC system; antispoofing; automatic speaker verification; back-end generative models; biometric recognizer; false acceptances; i-Vector Space; score fusion; speaker modeling; spoofing attacks; synthesis-channel subspace; vocoder-mismatched ASV; voice biometric; voice conversion attacks; Computational modeling; Feature extraction; Joints; Natural languages; Protocols; Speech; Training; Speaker recognition; anti-spoofing; i-vector; joint verification; joint verification and anti-spoofing; speaker recognition; spoofing; voice conversion attack;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2015.2407362
Filename :
7050279
Link To Document :
بازگشت