A new speaker verification spoofing countermeasure based on local binary patterns

被引:0
|
作者
Alegre, Federico [1 ]
Vipperla, Ravichander [2 ]
Amehraye, Asmaa [1 ]
Evans, Nicholas [1 ]
机构
[1] EURECOM, Multimedia Commun Dept, Sophia Antipolis, France
[2] Nuance Commun, Cambridge, England
来源
14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5 | 2013年
基金
欧盟第七框架计划;
关键词
speaker verification; biometrics; imposture; countermeasures; local binary patterns; FREQUENCY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a new countermeasure for the protection of automatic speaker verification systems from spoofed, converted voice signals. The new countermeasure is based on the analysis of a sequence of acoustic feature vectors using Local Binary Patterns (LBPs). Compared to existing approaches the new countermeasure is less reliant on prior knowledge and affords robust protection from not only voice conversion, for which it is optimised, but also spoofing attacks from speech synthesis and artificial signals, all of which otherwise provoke significant increases in false acceptance. The work highlights the difficulty in detecting converted voice and also discusses the need for formal evaluations to develop new countermeasures which are less reliant on prior knowledge and thus more reflective of practical use cases.
引用
收藏
页码:940 / 944
页数:5
相关论文
共 50 条
  • [21] The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification
    Yan, Chen
    Long, Yan
    Ji, Xiaoyu
    Xu, Wenyuan
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1215 - 1229
  • [22] Voice Transformation-based Spoofing of Text-Dependent Speaker Verification Systems
    Kons, Zvi
    Aronowitz, Hagai
    14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5, 2013, : 945 - 949
  • [23] SAS : A SPEAKER VERIFICATION SPOOFING DATABASE CONTAINING DIVERSE ATTACKS
    Wu, Zhizheng
    Khodabakhsh, Ali
    Demiroglu, Cenk
    Yamagishi, Junichi
    Saito, Daisuke
    Toda, Tomoki
    King, Simon
    2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 4440 - 4444
  • [24] Anti-spoofing Methods for Automatic Speaker Verification System
    Lavrentyeva, Galina
    Novoselov, Sergey
    Simonchik, Konstantin
    ANALYSIS OF IMAGES, SOCIAL NETWORKS AND TEXTS, AIST 2016, 2017, 661 : 172 - 184
  • [25] VSASV: a Vietnamese Dataset for Spoofing-Aware Speaker Verification
    Vu Hoang
    Viet Thanh Pham
    Hoa Nguyen Xuan
    Nhi Pham
    Phuong Dat
    Thi Thu Trang Nguyen
    INTERSPEECH 2024, 2024, : 4288 - 4292
  • [26] DoubleDeceiver: Deceiving the Speaker Verification System Protected by Spoofing Countermeasures
    Zhang, Mengao
    Xu, Ke
    Li, Hao
    Wang, Lei
    Fang, Chengfang
    Shi, Jie
    INTERSPEECH 2023, 2023, : 4014 - 4018
  • [27] The GMM and I-Vector Systems Based on Spoofing Algorithms for Speaker Spoofing Detection
    Tang, Hui
    Lei, Zhenchun
    Huang, Zhongying
    Gan, Hailin
    Yu, Kun
    Yang, Yingen
    BIOMETRIC RECOGNITION (CCBR 2019), 2019, 11818 : 502 - 510
  • [28] Binary Neural Network for Speaker Verification
    Zhu, Tinglong
    Qin, Xiaoyi
    Li, Ming
    INTERSPEECH 2021, 2021, : 86 - 90
  • [29] Cancelable Speaker Verification System Based on Binary Gaussian Mixtures
    Mtibaa, Aymen
    Petrovska-Delacretaz, Dijana
    Ben Hamida, Ahmed
    2018 4TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2018,
  • [30] On the performance of empirical mode decomposition-based replay spoofing detection in speaker verification systems
    Sapan H. Mankad
    Sanjay Garg
    Progress in Artificial Intelligence, 2020, 9 : 325 - 339