On robustness of speech based biometric systems against voice conversion attack

作者: Monisankha Pal , Goutam Saha

DOI: 10.1016/J.ASOC.2015.01.036

关键词:

摘要: Graphical abstractDisplay Omitted HighlightsEvaluation of robustness SID and SV systems against VC spoofing attack.The vulnerability in decreasing order techniques is GMM, WFW WFW-.In systems, GMM-SVM more resilient than GMM-UBM for impostor attacks.All are robust to cross-gender intra-gender converted voices.An approach relating the score with performance proposed. Voice conversion (VC) approach, which morphs voice a source speaker be perceived as spoken by specified target speaker, can intentionally used deceive identification (SID) verification (SV) that use speech biometric. attacks imitate particular pose potential threat these kinds systems. In this paper, we first present an experimental study evaluate such disguise. We Gaussian mixture model (GMM) based GMM universal background (GMM-UBM) supervector support vector machine (GMM-SVM) this. conducted using three different techniques: technique, weighted frequency warping (WFW) method its variation, where energy correction disabled (WFW-). Evaluation done conversions between fifty male female speakers taken from TIMIT database. The result indicated degradation percentage correct (POC) equal error rate (EER) all Experimental results show most vulnerable towards WFW- conversion. From results, it also said that, general terms, slightly voices through This work extended find out relationship objective system CMU ARCTIC database, parallel corpus. experiment on quantifying related ability spoof system.

参考文章(51)
Takashi Masuko, Keiichi Tokuda, Takao Kobayashi, Takafumi Hitotsumatsu, On the security of HMM-based speaker verification systems against imposture using synthetic speech. conference of the international speech communication association. ,(1999)
Corinne Fredouille, Jean-François Bonastre, Driss Matrouf, Artificial impostor voice transformation effects on false acceptance rates conference of the international speech communication association. pp. 2053- 2056 ,(2007)
Mats Blomberg, Johan Lindberg, Vulnerability in speaker verification. A study of technical impostor techniques conference of the international speech communication association. pp. 1211- 1214 ,(1999)
Junichi Yamagishi, P.L. De Leon, M. Pucher, Evaluation of the Vulnerability of Speaker Verification to Synthetic Speech Odyssey. pp. 28- ,(2010)
H. Valbret, E. Moulines, J.P. Tubach, Voice transformation using PSOLA technique conference of the international speech communication association. ,vol. 11, pp. 175- 187 ,(1992) , 10.1016/0167-6393(92)90012-V
W.M. Campbell, J.P. Campbell, D.A. Reynolds, E. Singer, P.A. Torres-Carrasquillo, Support vector machines for speaker and language recognition Computer Speech & Language. ,vol. 20, pp. 210- 229 ,(2006) , 10.1016/J.CSL.2005.06.003
Tomoko Matsui, Sadaoki Furui, Likelihood normalization for speaker verification using a phoneme- and speaker-independent model Speech Communication. ,vol. 17, pp. 109- 116 ,(1995) , 10.1016/0167-6393(95)00011-C
Douglas A. Reynolds, Thomas F. Quatieri, Robert B. Dunn, Speaker Verification Using Adapted Gaussian Mixture Models Digital Signal Processing. ,vol. 10, pp. 19- 41 ,(2000) , 10.1006/DSPR.1999.0361
Federico Alegre, Asmaa Amehraye, Nicholas Evans, A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns international conference on biometrics theory applications and systems. pp. 1- 8 ,(2013) , 10.1109/BTAS.2013.6712706