Skip to Main content Skip to Navigation
Conference papers

A Study of the Vulnerability of Text-Dependent Speaker Verification System Against Voice Conversion Spoofing Attack

Abstract : Voice conversion technique, which is to change one speaker's voice to sound like it was pronounced by another speaker, has the potential to break down a speaker verification system. The vulnerability of text-independent speaker verification systems under spoofing attack simulated by statistical voice conversion has been confirmed in our previous work. In this study, we continue the study of vulnerability of the text-dependent speaker verification system attacked voice conversion techniques. We implemented both the joint density Gaussian mixture model (JD-GMM) based voice conversion and the unit-selection based voice conversion systems to simulate spoofing attack. In addition , the performances of text-independent and text-dependent speaker verification systems are compared. We conduct the experiments using RSR2015 database which is recorded using mobile device. The experiments show that .
Complete list of metadatas

Cited literature [14 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-01927579
Contributor : Anthony Larcher <>
Submitted on : Monday, November 19, 2018 - 11:41:26 PM
Last modification on : Monday, March 9, 2020 - 10:36:38 AM
Document(s) archivé(s) le : Wednesday, February 20, 2019 - 4:39:30 PM

File

is2013_spoofing_attack.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-01927579, version 1

Collections

Citation

Zhizheng Wu, Anthony Larcher, Kong Aik Lee, Eng Chng, Tomi Kinnunen, et al.. A Study of the Vulnerability of Text-Dependent Speaker Verification System Against Voice Conversion Spoofing Attack. Annual Conference of the International Association of Speech Communication (Interspeech), Aug 2013, Lyon, France. ⟨hal-01927579⟩

Share

Metrics

Record views

82

Files downloads

26