DocumentCode :
3713612
Title :
On the vulnerability of speaker verification to realistic voice spoofing
Author :
Serife Kucur Erg?nay;Elie Khoury;Alexandros Lazaridis;S?bastien Marcel
Author_Institution :
Idiap Research Institute, Centre du Parc, Martigny, Switzerland
fYear :
2015
Firstpage :
1
Lastpage :
6
Abstract :
Automatic speaker verification (ASV) systems are subject to various kinds of malicious attacks. Replay, voice conversion and speech synthesis attacks drastically degrade the performance of a standard ASV system by increasing its false acceptance rates. This issue raised a high level of interest in the speech research community where the possible voice spoofing attacks and their related countermeasures have been investigated. However, much less effort has been devoted in creating realistic and diverse spoofing attack databases that foster researchers to correctly evaluate their countermeasures against attacks. The existing studies are not complete in terms of types of attacks, and often difficult to reproduce because of unavailability of public databases. In this paper we introduce the voice spoofing data-set of AVspoof, a public audio-visual spoofing database. AVspoof includes ten realistic spoofing threats generated using replay, speech synthesis and voice conversion. In addition, we provide a set of experimental results that show the effect of such attacks on current state-of-the-art ASV systems.
Keywords :
"Speech","Speech synthesis","Databases","Microphones","Hidden Markov models","Face","Biometrics (access control)"
Publisher :
ieee
Conference_Titel :
Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on
Type :
conf
DOI :
10.1109/BTAS.2015.7358783
Filename :
7358783
Link To Document :
بازگشت