Towards Generating Adversarial Examples on Combined Systems of Automatic Speaker Verification and Spoofing Countermeasure

被引:0
作者
Zhang, Xingyu [1 ]
Zhang, Xiongwei [1 ]
Zou, Xia [1 ]
Liu, Haibo [1 ]
Sun, Meng [1 ]
机构
[1] Army Engn Univ, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
ASVSPOOF;
D O I
10.1155/2022/2666534
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of unprotected automatic speaker verification (ASV) system is vulnerable to a variety of spoofing attacks where an attacker (adversary) disguises him/herself as a specific targeted user. It is a common practice to use spoofing countermeasure (CM) to improve the security of ASV systems so as to avoid illegal access. However, recent studies have shown that both ASV and CM systems are vulnerable to adversarial attacks. Previous researches mainly focus on adversarial attacks on a single ASV or CM system. But in practical scenarios, ASVs are typically deployed in conjunction with CM. In this paper, we investigate attacking the tandem system of ASV and CM with adversarial examples. The joint objective function is designed to restrict the generating process of adversarial examples. The joint gradient of the ASV and CM system is derived to generate adversarial examples. Fast Gradient Sign Method (FSGM) and Projected Gradient Descent (PGD) are utilized to study the vulnerability of tandem verification systems against white-box adversarial attacks. Through our attack, audio samples whose original labels are spoof or nontarget can be successfully accepted by the tandem system. Experimental results on the ASVSpoof2019 dataset show that the tandem system is vulnerable to our proposed attack.
引用
收藏
页数:12
相关论文
共 41 条
  • [1] Automatic Speaker Recognition for Mobile Forensic Applications
    Algabri, Mohammed
    Mathkour, Hassan
    Bencherif, Mohamed A.
    Alsulaiman, Mansour
    Mekhtiche, Mohamed A.
    [J]. MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [2] Chen G., 2021, P OF IEEE S SEC PRIV
  • [3] Consortium A, ASVSPOOF2019 AUTOMAT
  • [4] Das R.K, 2020, P 2020 21TH ANN C IN
  • [5] A Gated Recurrent Convolutional Neural Network for Robust Spoofing Detection
    Gomez-Alanis, Alejandro
    Peinado, Antonio M.
    Gonzalez, Jose A.
    Gomez, Angel M.
    [J]. IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2019, 27 (12) : 1985 - 1999
  • [6] Gong Y, 2018, P OF DYNAMIC NOVEL A
  • [7] Hu J, 2018, PROC CVPR IEEE, P7132, DOI [10.1109/TPAMI.2019.2913372, 10.1109/CVPR.2018.00745]
  • [8] Adversarial attack and defense strategies for deep speaker recognition systems
    Jati, Arindam
    Hsu, Chin-Cheng
    Pal, Monisankha
    Peri, Raghuveer
    AbdAlmageed, Wael
    Narayanan, Shrikanth
    [J]. COMPUTER SPEECH AND LANGUAGE, 2021, 68
  • [9] Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance
    Jeong, JaeHan
    Kwon, Sungmoon
    Hong, Man-Pyo
    Kwak, Jin
    Shon, Taeshik
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) : 16077 - 16091
  • [10] Advances in anti-spoofing: from the perspective of ASVspoof challenges
    Kamble, Madhu R.
    Sailor, Hardik B.
    Patil, Hemant A.
    Li, Haizhou
    [J]. APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2020, 9