DocumentCode
81096
Title
Joint Speaker Verification and Antispoofing in the
-Vector Space
Author
Sizov, Aleksandr ; Khoury, Elie ; Kinnunen, Tomi ; Zhizheng Wu ; Marcel, Sebastien
Author_Institution
Sch. of Comput., Univ. of Eastern Finland, Joensuu, Finland
Volume
10
Issue
4
fYear
2015
fDate
Apr-15
Firstpage
821
Lastpage
832
Abstract
Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), is no exception; replay, synthesis, and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks considered as one of the most challenging for modern recognition systems. To detect spoofing, most existing countermeasures assume explicit or implicit knowledge of a particular VC system and focus on designing discriminative features. In this paper, we explore back-end generative models for more generalized countermeasures. In particular, we model synthesis-channel subspace to perform speaker verification and antispoofing jointly in the
-vector space, which is a well-established technique for speaker modeling. It enables us to integrate speaker verification and antispoofing tasks into one system without any fusion techniques. To validate the proposed approach, we study vocoder-matched and vocoder-mismatched ASV and VC spoofing detection on the NIST 2006 speaker recognition evaluation data set. Promising results are obtained for standalone countermeasures as well as their combination with ASV systems using score fusion and joint approach.
Keywords
biometrics (access control); speaker recognition; ASV systems; NIST 2006 speaker recognition evaluation data set; VC attacks; VC spoofing detection; VC system; antispoofing; automatic speaker verification; back-end generative models; biometric recognizer; false acceptances; i-Vector Space; score fusion; speaker modeling; spoofing attacks; synthesis-channel subspace; vocoder-mismatched ASV; voice biometric; voice conversion attacks; Computational modeling; Feature extraction; Joints; Natural languages; Protocols; Speech; Training; Speaker recognition; anti-spoofing; i-vector; joint verification; joint verification and anti-spoofing; speaker recognition; spoofing; voice conversion attack;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2015.2407362
Filename
7050279
Link To Document