2015
DOI: 10.1007/s11042-015-3080-9
|View full text |Cite
|
Sign up to set email alerts
|

On the study of replay and voice conversion attacks to text-dependent speaker verification

Abstract: Automatic speaker verification (ASV) is to automatically accept or reject a claimed identity based on a speech sample. Recently, individual studies have confirmed the vulnerability of state-of-the-art text-independent ASV systems under replay, speech synthesis and voice conversion attacks on various databases. However, the behaviours of text-dependent ASV systems have not been systematically assessed in the face of various spoofing attacks. In this work, we first conduct a systematic analysis of text-dependent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 42 publications
(16 citation statements)
references
References 46 publications
(32 reference statements)
0
16
0
Order By: Relevance
“…Here nx(n) is the re-scaled signal of x(n). 2) Compute the cepstrally-smoothed power spectrum 14 |S(ω)| 2 of |X(ω)| 2 . 3) Compute the MGD spectrum (R and I denote the real and imaginary parts of the spectrum)…”
Section: B Modified Group Delay Cepstral Featurementioning
confidence: 99%
See 2 more Smart Citations
“…Here nx(n) is the re-scaled signal of x(n). 2) Compute the cepstrally-smoothed power spectrum 14 |S(ω)| 2 of |X(ω)| 2 . 3) Compute the MGD spectrum (R and I denote the real and imaginary parts of the spectrum)…”
Section: B Modified Group Delay Cepstral Featurementioning
confidence: 99%
“…A major concern, however, when deploying an ASV system, is its resilience to a spoofing attack. As identified in [8], there are at least four types of spoofing attack: impersonation [9], [10], [11], replay [12], [13], [14], speech synthesis [15], [16] and voice conversion [17], [18], [19], [20], [21]. Among the four types of spoofing attack, replay, speech synthesis, and voice conversion present the highest risk to ASV systems [8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Wu et al [13] conduct a systematic analysis of text-dependent speaker verification systems to speech replay and voice conversion attacks. Specifically, using the same protocol and database, they analyze the interplay of voice conversion and speaker verification by linking the voice conversion objective evaluation measures with the speaker verification error rates to investigate the vulnerabilities from the perspective of voice conversion.…”
Section: Security Of Immersive Audio/visual Systemsmentioning
confidence: 99%
“…For the ASV systems, impersonation [8], replay [9], speech synthesis (SS) [6] and voice conversion (VC) [10] are the four major direct spoofing attack types against ASV systems [11]. Among these four attack types, impersonation is less likely since it requires a professional skill to mimic a target speaker's voice.…”
Section: Introductionmentioning
confidence: 99%