Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech

Tomi Kinnunen, Zhizheng Wu, Kong Aik Lee, Filip Sedlak, E. S. Chng, Haizhou Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks using telephone speech. We implemented a voice conversion systems with two types of features and nonparallel frame alignment methods and five speaker verification systems ranging from simple Gaussian mixture models (GMMs) to state-of-the-art joint factor analysis (JFA) recognizer. Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks. But even it experiences more than 5-fold increase in the false acceptance rate from 3.24 % to 17.33 %.
Original languageEnglish
Title of host publicationAcoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages4401-4404
Number of pages3
ISBN (Print)978-1-4673-0045-2
DOIs
Publication statusPublished - 2012

Fingerprint

Dive into the research topics of 'Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech'. Together they form a unique fingerprint.

Cite this