301. I-vectors meet imitators: On vulnerability of speaker verification systems against voice mimicry
- Author
-
Anne-Maria Laukkanen, Rosa González Hautamäki, Ville Hautamäki, Timo Leino, and Tomi Kinnunen
- Subjects
Speaker verification ,Computer science ,Speech recognition ,Classifier (linguistics) ,Mimicry ,Imitation (music) ,Speaker recognition ,Mixture model ,Vulnerability (computing) ,Voice analysis - Abstract
Voice imitation is mimicry of another speaker’s voice characteristics and speech behavior. Professional voice mimicry can create entertaining, yet realistic sounding target speaker renditions. As mimicry tends to exaggerate prosodic, idiosyncratic and lexical behavior, it is unclear how modern spectral-feature automatic speaker verification systems respond to mimicry “attacks”. We study the vulnerability of two well-known speaker recognition systems, traditional Gaussian mixture model – universal background model (GMM-UBM) and a state-of-the-art i-vector classifier with cosine scoring. The material consists of one professional Finnish imitator impersonating five wellknown Finnish public figures. In a carefully controlled setting, mimicry attack does slightly increase the false acceptance rate for the i-vector system, but generally this is not alarmingly large in comparison to voice conversion or playback attacks. Index Terms: Voice imitation, speaker recognition, mimicry attack