10th ISCA Workshop on Speech Synthesis (SSW 10) 2019
DOI: 10.21437/ssw.2019-29
|View full text |Cite
|
Sign up to set email alerts
|

V2S attack: building DNN-based voice conversion from automatic speaker verification

Abstract: This paper presents a new voice impersonation attack using voice conversion (VC). Enrolling personal voices for automatic speaker verification (ASV) offers natural and flexible biometric authentication systems. Basically, the ASV systems do not include the users' voice data. However, if the ASV system is unexpectedly exposed and hacked by a malicious attacker, there is a risk that the attacker will use VC techniques to reproduce the enrolled user's voices. We name this the "verificationto-synthesis (V2S) attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…First, from the acoustic signal, speaker verification system extracts features closely related to the identity of speakers, rather than those related to semantics. Since it performs different task than speech recognition system, in our systematization, we do not consider those attacks or defense works in the speaker verification domain [21], [42], [56], [66]- [68], [76], [113], [119], [131]. Second, we do not consider exploiting vulnerabilities in other applications, operating systems, or even hardware [9], [52], [74], [121], [143], [149] to indirectly attack ASR, since our intention is to study the inherent "vulnerabilities" residing in ASR itself.…”
Section: Scope Of This Sokmentioning
confidence: 99%
“…First, from the acoustic signal, speaker verification system extracts features closely related to the identity of speakers, rather than those related to semantics. Since it performs different task than speech recognition system, in our systematization, we do not consider those attacks or defense works in the speaker verification domain [21], [42], [56], [66]- [68], [76], [113], [119], [131]. Second, we do not consider exploiting vulnerabilities in other applications, operating systems, or even hardware [9], [52], [74], [121], [143], [149] to indirectly attack ASR, since our intention is to study the inherent "vulnerabilities" residing in ASR itself.…”
Section: Scope Of This Sokmentioning
confidence: 99%