A Study of the Vulnerability of Text-Dependent Speaker Verification System Against Voice Conversion Spoofing Attack - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2013

A Study of the Vulnerability of Text-Dependent Speaker Verification System Against Voice Conversion Spoofing Attack

Résumé

Voice conversion technique, which is to change one speaker's voice to sound like it was pronounced by another speaker, has the potential to break down a speaker verification system. The vulnerability of text-independent speaker verification systems under spoofing attack simulated by statistical voice conversion has been confirmed in our previous work. In this study, we continue the study of vulnerability of the text-dependent speaker verification system attacked voice conversion techniques. We implemented both the joint density Gaussian mixture model (JD-GMM) based voice conversion and the unit-selection based voice conversion systems to simulate spoofing attack. In addition , the performances of text-independent and text-dependent speaker verification systems are compared. We conduct the experiments using RSR2015 database which is recorded using mobile device. The experiments show that .
Fichier principal
Vignette du fichier
is2013_spoofing_attack.pdf (57.32 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01927579 , version 1 (19-11-2018)

Identifiants

  • HAL Id : hal-01927579 , version 1

Citer

Zhizheng Wu, Anthony Larcher, Kong Aik Lee, Eng Siong Chng, Tomi Kinnunen, et al.. A Study of the Vulnerability of Text-Dependent Speaker Verification System Against Voice Conversion Spoofing Attack. Annual Conference of the International Association of Speech Communication (Interspeech), Aug 2013, Lyon, France. ⟨hal-01927579⟩

Collections

UNIV-LEMANS
65 Consultations
24 Téléchargements

Partager

Gmail Facebook X LinkedIn More