ON THE VULNERABILITY OF AUTOMATIC SPEAKER RECOGNITION TO SPOOFING ATTACKS WITH ARTIFICIAL SIGNALS - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

ON THE VULNERABILITY OF AUTOMATIC SPEAKER RECOGNITION TO SPOOFING ATTACKS WITH ARTIFICIAL SIGNALS

Federico Alegre
  • Fonction : Auteur
  • PersonId : 936309
Nicholas Evans
  • Fonction : Auteur
  • PersonId : 938450
Benoît Fauve
  • Fonction : Auteur

Résumé

Automatic speaker verification (ASV) systems are increasingly being used for biometric authentication even if their vulnerability to imposture or spoofing is now widely acknowledged. Recent work has proposed different spoofing approaches which can be used to test vulnerabilities. This paper introduces a new approach based on artificial, tone-like signals which provoke higher ASV scores than genuine client tests. Experimental results show degradations in the equal error rate from 8.5% to 77.3% and from 4.8% to 64.3% for standard Gaussian mixture model and factor analysis based ASV systems respectively. These findings demonstrate the importance of efforts to develop dedicated countermeasures, some of them trivial, to protect ASV systems from spoofing.
Fichier principal
Vignette du fichier
EUSIPCO2012_Alegre.pdf (308.63 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00783812 , version 1 (01-02-2013)

Identifiants

  • HAL Id : hal-00783812 , version 1

Citer

Federico Alegre, Ravichander Vipperla, Nicholas Evans, Benoît Fauve. ON THE VULNERABILITY OF AUTOMATIC SPEAKER RECOGNITION TO SPOOFING ATTACKS WITH ARTIFICIAL SIGNALS. EUSIPCO 2012, 20th European Signal Processing Conference, Aug 2012, Bucharest, Romania. ⟨hal-00783812⟩

Collections

EURECOM
142 Consultations
228 Téléchargements

Partager

Gmail Facebook X LinkedIn More