Back to Search
Start Over
Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints
- Source :
- INTERSPEECH, Scopus-Elsevier, Wu, Z, Larcher, A, Lee, K-A, Chng, E, Kinnunen, T & Li, H 2013, Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints . in INTERSPEECH 2013 14thAnnual Conference of the International Speech Communication Association . pp. 950-954 . < http://www.isca-speech.org/archive/interspeech_2013/i13_0950.html >
- Publication Year :
- 2013
- Publisher :
- ISCA, 2013.
-
Abstract
- Voice conversion, a technique to change one’s voice to sound like that of another, poses a threat to even high performance speaker verification system. Vulnerability of text-independent speaker verification systems under spoofing attack, using statistical voice conversion technique, was evaluated and confirmed in our previous work. In this paper, we further extend the study to text-dependent speaker verification systems. In particular, we compare both joint density Gaussian mixture model (JD-GMM) and unit-selection (US) spoofing methods and, for the first time, the performances of text-independent and text-dependent speaker verification systems in a single study. We conduct the experiments using RSR2015 database which is recorded using multiple mobile devices. The experimental results indicate that text-dependent speaker verification system tolerates spoofing attacks better than the text-independent counterpart. Index Terms: Speaker verification, text-dependent, textindependent, voice conversion, spoofing attack, security
Details
- Database :
- OpenAIRE
- Journal :
- Interspeech 2013
- Accession number :
- edsair.doi.dedup.....481a79b1362b53f59b1d3e31b72b99f9
- Full Text :
- https://doi.org/10.21437/interspeech.2013-293