A Study of the Vulnerability of Text-Dependent Speaker Verification System Against Voice Conversion Spoofing Attack

Abstract : Voice conversion technique, which is to change one speaker's voice to sound like it was pronounced by another speaker, has the potential to break down a speaker verification system. The vulnerability of text-independent speaker verification systems under spoofing attack simulated by statistical voice conversion has been confirmed in our previous work. In this study, we continue the study of vulnerability of the text-dependent speaker verification system attacked voice conversion techniques. We implemented both the joint density Gaussian mixture model (JD-GMM) based voice conversion and the unit-selection based voice conversion systems to simulate spoofing attack. In addition , the performances of text-independent and text-dependent speaker verification systems are compared. We conduct the experiments using RSR2015 database which is recorded using mobile device. The experiments show that .
Type de document :
Communication dans un congrès
Annual Conference of the International Association of Speech Communication (Interspeech), Aug 2013, Lyon, France
Liste complète des métadonnées

https://hal.archives-ouvertes.fr/hal-01927579
Contributeur : Anthony Larcher <>
Soumis le : lundi 19 novembre 2018 - 23:41:26
Dernière modification le : jeudi 22 novembre 2018 - 01:10:00

Fichier

is2013_spoofing_attack.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

  • HAL Id : hal-01927579, version 1

Collections

Citation

Zhizheng Wu, Anthony Larcher, Kong Lee, Eng Chng, Tomi Kinnunen, et al.. A Study of the Vulnerability of Text-Dependent Speaker Verification System Against Voice Conversion Spoofing Attack. Annual Conference of the International Association of Speech Communication (Interspeech), Aug 2013, Lyon, France. 〈hal-01927579〉

Partager

Métriques

Consultations de la notice

10

Téléchargements de fichiers

5