2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2012
DOI: 10.1109/icassp.2012.6288895
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech

Abstract: Voice conversion -the methodology of automatically converting one's utterances to sound as if spoken by another speaker -presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks using telephone speech. We implemented a voice conversion systems with two types of features and nonparallel frame alignment methods and five speaker verification systems ranging from simple Gaussian mixture models (GMMs)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

4
112
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 146 publications
(116 citation statements)
references
References 13 publications
4
112
0
Order By: Relevance
“…Similar to many other studies [12,22], spoofing detection was evaluated by measuring the EER values. In addition, detection error trade-off (DET) curves were plotted to show the relation between false alarm and miss probabilities.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Similar to many other studies [12,22], spoofing detection was evaluated by measuring the EER values. In addition, detection error trade-off (DET) curves were plotted to show the relation between false alarm and miss probabilities.…”
Section: Resultsmentioning
confidence: 99%
“…Quite recently, researchers have started to investigate how much ASV systems are prone to spoofing using various methods. Various researchers have worked on assessing the threat caused by imitators [13,23], speech synthesis [26,35], converted speech [22,39] or replay of previously acquired recordings [3,24]. In parallel, much effort has been invested in work on various spoofing countermeasures.…”
Section: Introductionmentioning
confidence: 99%
“…Second, the voice conversion (VC) techniques (Jin et al, 2008), (Kinnunen et al, 2012). Both techniques can be used to generate spoofing signals that can successfully deceive state-of-the-art SV systems with false acceptance rates (FAR) around 80% for synthetic speech and 5% for VC.…”
Section: Introductionmentioning
confidence: 99%
“…Impersonation, replay, speech synthesis and voice conversion are some examples of spoofing attacks. Impersonation or human mimicking requires a mimic to imitate a target speaker's voice and it does not pose a genuine threat to automatic speaker verification system [1][2][3][4][5]. Replay attacks consist of playing back the pre-recorded voice of a target speaker to spoof the system.…”
Section: Introductionmentioning
confidence: 99%