ON THE VULNERABILITY OF AUTOMATIC SPEAKER RECOGNITION TO SPOOFING ATTACKS WITH ARTIFICIAL SIGNALS

Abstract : Automatic speaker verification (ASV) systems are increasingly being used for biometric authentication even if their vulnerability to imposture or spoofing is now widely acknowledged. Recent work has proposed different spoofing approaches which can be used to test vulnerabilities. This paper introduces a new approach based on artificial, tone-like signals which provoke higher ASV scores than genuine client tests. Experimental results show degradations in the equal error rate from 8.5% to 77.3% and from 4.8% to 64.3% for standard Gaussian mixture model and factor analysis based ASV systems respectively. These findings demonstrate the importance of efforts to develop dedicated countermeasures, some of them trivial, to protect ASV systems from spoofing.
Type de document :
Communication dans un congrès
EUSIPCO 2012, 20th European Signal Processing Conference, Aug 2012, Bucharest, Romania
Liste complète des métadonnées

Littérature citée [16 références]  Voir  Masquer  Télécharger

http://hal.upmc.fr/hal-00783812
Contributeur : Federico Alegre <>
Soumis le : vendredi 1 février 2013 - 16:52:15
Dernière modification le : jeudi 5 février 2015 - 16:24:57
Document(s) archivé(s) le : samedi 1 avril 2017 - 15:18:12

Fichier

EUSIPCO2012_Alegre.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

  • HAL Id : hal-00783812, version 1

Collections

Citation

Federico Alegre, Ravichander Vipperla, Nicholas Evans, Benoît Fauve. ON THE VULNERABILITY OF AUTOMATIC SPEAKER RECOGNITION TO SPOOFING ATTACKS WITH ARTIFICIAL SIGNALS. EUSIPCO 2012, 20th European Signal Processing Conference, Aug 2012, Bucharest, Romania. 〈hal-00783812〉

Partager

Métriques

Consultations de la notice

200

Téléchargements de fichiers

342