首页> 外文会议>IEEE International Conference on Acoustics, Speech and Signal Processing;ICASSP >Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
【24h】

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech

机译:说话人验证系统针对语音转换欺骗攻击的脆弱性:电话语音的情况

获取原文

摘要

Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks using telephone speech. We implemented a voice conversion systems with two types of features and nonparallel frame alignment methods and five speaker verification systems ranging from simple Gaussian mixture models (GMMs) to state-of-the-art joint factor analysis (JFA) recognizer. Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks. But even it experiences more than 5-fold increase in the false acceptance rate from 3.24 % to 17.33 %.
机译:语音转换-一种将自己的话音自动转换为听起来像另一位说话者说话的方法-对于依赖说话者验证的应用程序构成了威胁。我们研究了独立于文本的说话者验证系统针对使用电话语音的语音转换攻击的脆弱性。我们实施了具有两种功能和非平行帧对齐方法的语音转换系统,以及从简单的高斯混合模型(GMM)到最新的联合因子分析(JFA)识别器的五种说话者验证系统。对NIST 2006 SRE语料库的子集进行的实验表明,JFA方法对转换攻击的恢复能力最强。但是,即使它的错误接受率也从3.24%增加到17.33%,超过5倍。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号