GANBA: Generative Adversarial Network for Biometric Anti-Spoofing

被引:11
作者
Gomez-Alanis, Alejandro [1 ]
Gonzalez-Lopez, Jose A. [1 ]
Peinado, Antonio M. [1 ]
机构
[1] Univ Granada, Dept Signal Theory Telemat & Commun, Granada 18010, Spain
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 03期
关键词
adversarial attacks; automatic speaker verification (ASV); anti-spoofing; presentation attack detection (PAD); voice biometrics; AUTOMATIC SPEAKER VERIFICATION; COUNTERMEASURES; RECOGNITION;
D O I
10.3390/app12031454
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Automatic speaker verification (ASV) is a voice biometric technology whose security might be compromised by spoofing attacks. To increase the robustness against spoofing attacks, presentation attack detection (PAD) or anti-spoofing systems for detecting replay, text-to-speech and voice conversion-based spoofing attacks are being developed. However, it was recently shown that adversarial spoofing attacks may seriously fool anti-spoofing systems. Moreover, the robustness of the whole biometric system (ASV + PAD) against this new type of attack is completely unexplored. In this work, a new generative adversarial network for biometric anti-spoofing (GANBA) is proposed. GANBA has a twofold basis: (1) it jointly employs the anti-spoofing and ASV losses to yield very damaging adversarial spoofing attacks, and (2) it trains the PAD as a discriminator in order to make them more robust against these types of adversarial attacks. The proposed system is able to generate adversarial spoofing attacks which can fool the complete voice biometric system. Then, the resulting PAD discriminators of the proposed GANBA can be used as a defense technique for detecting both original and adversarial spoofing attacks. The physical access (PA) and logical access (LA) scenarios of the ASVspoof 2019 database were employed to carry out the experiments. The experimental results show that the GANBA attacks are quite effective, outperforming other adversarial techniques when applied in white-box and black-box attack setups. In addition, the resulting PAD discriminators are more robust against both original and adversarial spoofing attacks.
引用
收藏
页数:18
相关论文
共 48 条
[1]  
[Anonymous], 2016, 2016 IEEE 8 INT C BI
[2]  
Brummer N., 2010, P OD 2010 BRNO CZECH
[3]  
Bruna J., 2014, INT C LEARN REPR
[4]   Anti-spoofing in action: joint operation with a verification system [J].
Chingovska, Ivana ;
Anjos, Andre ;
Marcel, Sebastien .
2013 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2013, :98-104
[5]   Evaluation of Speaker Verification Security and Detection of HMM-Based Synthetic Speech [J].
De Leon, Phillip L. ;
Pucher, Michael ;
Yamagishi, Junichi ;
Hernaez, Inma ;
Saratxaga, Ibon .
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2012, 20 (08) :2280-2290
[6]   MAXIMUM LIKELIHOOD FROM INCOMPLETE DATA VIA EM ALGORITHM [J].
DEMPSTER, AP ;
LAIRD, NM ;
RUBIN, DB .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-METHODOLOGICAL, 1977, 39 (01) :1-38
[7]  
Deng YP, 2020, IEEE IMAGE PROC, P1241, DOI [10.1109/ICIP40778.2020.9191288, 10.1109/icip40778.2020.9191288]
[8]   The NIST speaker recognition evaluation - Overview, methodology, systems, results, perspective [J].
Doddington, GR ;
Przybocki, MA ;
Martin, AF ;
Reynolds, DA .
SPEECH COMMUNICATION, 2000, 31 (2-3) :225-254
[9]  
Gomez-Alanis A., 2018, P IBERSPEECH 2018, P45
[10]  
Gomez-Alanis A., 2021, P IBERSPEECH 2021, P255