Back to Search Start Over

Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints

Authors :
Tomi Kinnunen
Kong Aik Lee
Anthony Larcher
Zhizheng Wu
Haizhou Li
Eng Siong Chng
Source :
INTERSPEECH, Scopus-Elsevier, Wu, Z, Larcher, A, Lee, K-A, Chng, E, Kinnunen, T & Li, H 2013, Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints . in INTERSPEECH 2013 14thAnnual Conference of the International Speech Communication Association . pp. 950-954 . < http://www.isca-speech.org/archive/interspeech_2013/i13_0950.html >
Publication Year :
2013
Publisher :
ISCA, 2013.

Abstract

Voice conversion, a technique to change one’s voice to sound like that of another, poses a threat to even high performance speaker verification system. Vulnerability of text-independent speaker verification systems under spoofing attack, using statistical voice conversion technique, was evaluated and confirmed in our previous work. In this paper, we further extend the study to text-dependent speaker verification systems. In particular, we compare both joint density Gaussian mixture model (JD-GMM) and unit-selection (US) spoofing methods and, for the first time, the performances of text-independent and text-dependent speaker verification systems in a single study. We conduct the experiments using RSR2015 database which is recorded using multiple mobile devices. The experimental results indicate that text-dependent speaker verification system tolerates spoofing attacks better than the text-independent counterpart. Index Terms: Speaker verification, text-dependent, textindependent, voice conversion, spoofing attack, security

Details

Database :
OpenAIRE
Journal :
Interspeech 2013
Accession number :
edsair.doi.dedup.....481a79b1362b53f59b1d3e31b72b99f9
Full Text :
https://doi.org/10.21437/interspeech.2013-293