Spoofing and Anti-Spoofing: A Shared View of Speaker Verification, Speech Synthesis and Voice Conversion

Zhizheng Wu, Tomi Kinnunen, Nicholas Evans, Junichi Yamagishi

Research output: Contribution to conferenceOtherpeer-review

Abstract

Automatic speaker verification (ASV) offers a low-cost and flexible biometric solution to person authentication. While the reliability of ASV systems is now considered sufficient to support mass-market adoption, there are concerns that the technology is vulnerable to spoofing, also referred to as presentation attacks. Spoofing refers to an attack whereby a fraudster attempts to manipulate a biometric system by masquerading as another, enrolled person. On the other hand, speaker adaptation in speech synthesis and voice conversion techniques attempt to mimic a target speaker's voice automatically, and hence present a genuine threat to ASV systems.

The research community has responded to speech synthesis and voice conversion spoofing attacks with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; ASV systems remain vulnerable to spoofing, and a deeper understanding of speaker verification, speech synthesis and voice conversion will be fundamental to the pursuit of spoofing-robust speaker verification.

While the level of interest is growing, the level of effort to develop spoofing countermeasures for ASV is lagging behind that for other biometric modalities. What's more, the vulnerabilities of ASV to spoofing are now well acknowledged. A tutorial on spoofing and anti-spoofing from the combined perspective of speaker verification, speech synthesis and voice conversion is much needed. The tutorial will attract, not only members of the growing anti-spoofing research community, but also the broader community of general practitioners in speaker verification, speech synthesis and voice conversion.

The speakers have led the research community in anti-spoofing for ASV since 2013, have jointly authored a growing number of conference papers, book chapters and the latest survey paper published in Speech Communications in 2015. Between them they have organised two special sessions and one evaluation/challenge (http://www.spoofingchallenge.org/) on the same topic. The experience gained through these activities is be the foundation of this tutorial proposal for APSIPA ASC 2015.
Original languageEnglish
Number of pages3
Publication statusPublished - 2015
EventAsia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) - Hong Kong, China
Duration: 16 Dec 201519 Dec 2015

Conference

ConferenceAsia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)
CountryChina
CityHong Kong
Period16/12/1519/12/15

Fingerprint Dive into the research topics of 'Spoofing and Anti-Spoofing: A Shared View of Speaker Verification, Speech Synthesis and Voice Conversion'. Together they form a unique fingerprint.

Cite this