DocumentCode
254374
Title
Re-assessing the threat of replay spoofing attacks against automatic speaker verification
Author
Alegre, F. ; Janicki, A. ; Evans, N.
Author_Institution
EURECOM, Sophia Antipolis, France
fYear
2014
fDate
10-12 Sept. 2014
Firstpage
1
Lastpage
6
Abstract
This paper re-examines the threat of spoofing or presentation attacks in the context of automatic speaker verification (ASV). While voice conversion and speech synthesis attacks present a serious threat, and have accordingly received a great deal of attention in the recent literature, they can only be implemented with a high level of technical know-how. In contrast, the implementation of replay attacks require no specific expertise nor any sophisticated equipment and thus they arguably present a greater risk. The comparative threat of each attack is re-examined in this paper against six different ASV systems including a state-of-the-art iVector-PLDA system. Despite the lack of attention in the literature, experiments show that low-effort replay attacks provoke higher levels of false acceptance than comparatively higher-effort spoofing attacks such as voice conversion and speech synthesis. Results therefore show the need to refocus research effort and to develop countermeasures against replay attacks in future work.
Keywords
security of data; speaker recognition; speech synthesis; ASV systems; automatic speaker verification; iVector-PLDA system; presentation attack threat reexamination; replay spoofing attack reassessment; speech synthesis attacks; voice conversion attacks; Acoustics; Adaptation models; Hidden Markov models; Speaker recognition; Speech; Speech synthesis; Standards;
fLanguage
English
Publisher
ieee
Conference_Titel
Biometrics Special Interest Group (BIOSIG), 2014 International Conference of the
Conference_Location
Darmstadt
Print_ISBN
978-3-88579-624-4
Type
conf
Filename
7029420
Link To Document