• DocumentCode
    3713612
  • Title

    On the vulnerability of speaker verification to realistic voice spoofing

  • Author

    Serife Kucur Erg?nay;Elie Khoury;Alexandros Lazaridis;S?bastien Marcel

  • Author_Institution
    Idiap Research Institute, Centre du Parc, Martigny, Switzerland
  • fYear
    2015
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Automatic speaker verification (ASV) systems are subject to various kinds of malicious attacks. Replay, voice conversion and speech synthesis attacks drastically degrade the performance of a standard ASV system by increasing its false acceptance rates. This issue raised a high level of interest in the speech research community where the possible voice spoofing attacks and their related countermeasures have been investigated. However, much less effort has been devoted in creating realistic and diverse spoofing attack databases that foster researchers to correctly evaluate their countermeasures against attacks. The existing studies are not complete in terms of types of attacks, and often difficult to reproduce because of unavailability of public databases. In this paper we introduce the voice spoofing data-set of AVspoof, a public audio-visual spoofing database. AVspoof includes ten realistic spoofing threats generated using replay, speech synthesis and voice conversion. In addition, we provide a set of experimental results that show the effect of such attacks on current state-of-the-art ASV systems.
  • Keywords
    "Speech","Speech synthesis","Databases","Microphones","Hidden Markov models","Face","Biometrics (access control)"
  • Publisher
    ieee
  • Conference_Titel
    Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on
  • Type

    conf

  • DOI
    10.1109/BTAS.2015.7358783
  • Filename
    7358783