DocumentCode
177673
Title
Evasion and obfuscation in automatic speaker verification
Author
Alegre, Federico ; Soldi, Giovanni ; Evans, Noah
Author_Institution
Multimedia Commun. Dept., EURECOM, Sophia Antipolis, France
fYear
2014
fDate
4-9 May 2014
Firstpage
749
Lastpage
753
Abstract
The potential for biometric systems to be manipulated through some form of subversion is well acknowledged. One such approach known as spoofing relates to the provocation of false accepts in authentication applications. Another approach referred to as obfuscation relates to the provocation of missed detections in surveillance applications. While the automatic speaker verification research community is now addressing spoofing and countermeasures, vulnerabilities to obfuscation remain largely unknown. This paper reports the first study. Our work with standard NIST datasets and protocols shows that the equal error rate of a standard GMM-UBM system is increased from 9% to 48% through obfuscation, whereas that of a state-of-the-art i-vector system increases from 3% to 20%. We also present a generalised approach to obfuscation detection which succeeds in detecting almost all attempts to evade detection.
Keywords
biometrics (access control); cryptographic protocols; speaker recognition; surveillance; GMM-UBM system; NIST datasets; authentication applications; automatic speaker verification; biometric systems; i-vector system; obfuscation; protocols; spoofing; surveillance; Authentication; Conferences; Speaker recognition; Speech; Speech processing; Standards; Surveillance; biometrics; evasion; obfuscation; speaker recognition; speaker verification; spoofing; surveillance;
fLanguage
English
Publisher
ieee
Conference_Titel
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
Conference_Location
Florence
Type
conf
DOI
10.1109/ICASSP.2014.6853696
Filename
6853696
Link To Document