• DocumentCode
    254374
  • Title

    Re-assessing the threat of replay spoofing attacks against automatic speaker verification

  • Author

    Alegre, F. ; Janicki, A. ; Evans, N.

  • Author_Institution
    EURECOM, Sophia Antipolis, France
  • fYear
    2014
  • fDate
    10-12 Sept. 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    This paper re-examines the threat of spoofing or presentation attacks in the context of automatic speaker verification (ASV). While voice conversion and speech synthesis attacks present a serious threat, and have accordingly received a great deal of attention in the recent literature, they can only be implemented with a high level of technical know-how. In contrast, the implementation of replay attacks require no specific expertise nor any sophisticated equipment and thus they arguably present a greater risk. The comparative threat of each attack is re-examined in this paper against six different ASV systems including a state-of-the-art iVector-PLDA system. Despite the lack of attention in the literature, experiments show that low-effort replay attacks provoke higher levels of false acceptance than comparatively higher-effort spoofing attacks such as voice conversion and speech synthesis. Results therefore show the need to refocus research effort and to develop countermeasures against replay attacks in future work.
  • Keywords
    security of data; speaker recognition; speech synthesis; ASV systems; automatic speaker verification; iVector-PLDA system; presentation attack threat reexamination; replay spoofing attack reassessment; speech synthesis attacks; voice conversion attacks; Acoustics; Adaptation models; Hidden Markov models; Speaker recognition; Speech; Speech synthesis; Standards;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Biometrics Special Interest Group (BIOSIG), 2014 International Conference of the
  • Conference_Location
    Darmstadt
  • Print_ISBN
    978-3-88579-624-4
  • Type

    conf

  • Filename
    7029420