A new speaker verification spoofing countermeasure based on local binary patterns

被引:0
|
作者
Alegre, Federico [1 ]
Vipperla, Ravichander [2 ]
Amehraye, Asmaa [1 ]
Evans, Nicholas [1 ]
机构
[1] EURECOM, Multimedia Commun Dept, Sophia Antipolis, France
[2] Nuance Commun, Cambridge, England
来源
14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5 | 2013年
基金
欧盟第七框架计划;
关键词
speaker verification; biometrics; imposture; countermeasures; local binary patterns; FREQUENCY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a new countermeasure for the protection of automatic speaker verification systems from spoofed, converted voice signals. The new countermeasure is based on the analysis of a sequence of acoustic feature vectors using Local Binary Patterns (LBPs). Compared to existing approaches the new countermeasure is less reliant on prior knowledge and affords robust protection from not only voice conversion, for which it is optimised, but also spoofing attacks from speech synthesis and artificial signals, all of which otherwise provoke significant increases in false acceptance. The work highlights the difficulty in detecting converted voice and also discusses the need for formal evaluations to develop new countermeasures which are less reliant on prior knowledge and thus more reflective of practical use cases.
引用
收藏
页码:940 / 944
页数:5
相关论文
共 50 条
  • [1] Backend Ensemble for Speaker Verification and Spoofing Countermeasure
    Zhang, Li
    Li, Yue
    Zhao, Huan
    Wang, Qing
    Xie, Lei
    INTERSPEECH 2022, 2022, : 4381 - 4385
  • [2] Speaker identification based on spectrogram and local binary patterns
    Li, Yuanyuan
    Wang, Yunfang
    Li, Penghua
    Feng, Huizong
    Journal of Computational Information Systems, 2015, 11 (08): : 2771 - 2778
  • [3] An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
    Janicki, Artur
    Alegre, Federico
    Evans, Nicholas
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 3030 - 3044
  • [4] On the Vulnerability of Speaker Verification to Realistic Voice Spoofing
    Ergunay, Serife Kucur
    Khoury, Elie
    Lazaridis, Alexandros
    Marcel, Sebastien
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [5] Generalized Replay Spoofing Countermeasure Based on Combining Local Subclassification Models
    Altuwayjiri, Sarah Mohammed
    Bchir, Ouiem
    Ben Ismail, Mohamed Maher
    APPLIED SCIENCES-BASEL, 2022, 12 (22):
  • [6] Data selection for i-vector based automatic speaker verification anti-spoofing
    Hanilci, Cemal
    DIGITAL SIGNAL PROCESSING, 2018, 72 : 171 - 180
  • [7] Spoofing and countermeasures for speaker verification: A survey
    Wu, Zhizheng
    Evans, Nicholas
    Kinnunen, Tomi
    Yamagishi, Junichi
    Alegre, Federico
    Li, Haizhou
    SPEECH COMMUNICATION, 2015, 66 : 130 - 153
  • [8] SPOOFING COUNTERMEASURES TO PROTECT AUTOMATIC SPEAKER VERIFICATION FROM VOICE CONVERSION
    Alegre, Federico
    Amehraye, Asmaa
    Evans, Nicholas
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 3068 - 3072
  • [9] Spoofing and Countermeasures for Speaker Verification: A Review
    Anjum, Z. Khamar
    Swamy, R. Kumara
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 467 - 471
  • [10] Spoofing and countermeasures for automatic speaker verification
    Evans, Nicholas
    Kinnunen, Tomi
    Yamagishi, Junichi
    14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5, 2013, : 925 - 929