DocumentCode
3713612
Title
On the vulnerability of speaker verification to realistic voice spoofing
Author
Serife Kucur Erg?nay;Elie Khoury;Alexandros Lazaridis;S?bastien Marcel
Author_Institution
Idiap Research Institute, Centre du Parc, Martigny, Switzerland
fYear
2015
Firstpage
1
Lastpage
6
Abstract
Automatic speaker verification (ASV) systems are subject to various kinds of malicious attacks. Replay, voice conversion and speech synthesis attacks drastically degrade the performance of a standard ASV system by increasing its false acceptance rates. This issue raised a high level of interest in the speech research community where the possible voice spoofing attacks and their related countermeasures have been investigated. However, much less effort has been devoted in creating realistic and diverse spoofing attack databases that foster researchers to correctly evaluate their countermeasures against attacks. The existing studies are not complete in terms of types of attacks, and often difficult to reproduce because of unavailability of public databases. In this paper we introduce the voice spoofing data-set of AVspoof, a public audio-visual spoofing database. AVspoof includes ten realistic spoofing threats generated using replay, speech synthesis and voice conversion. In addition, we provide a set of experimental results that show the effect of such attacks on current state-of-the-art ASV systems.
Keywords
"Speech","Speech synthesis","Databases","Microphones","Hidden Markov models","Face","Biometrics (access control)"
Publisher
ieee
Conference_Titel
Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on
Type
conf
DOI
10.1109/BTAS.2015.7358783
Filename
7358783
Link To Document