Graduate School and Research Center In communication systems

On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals

Alegre, Federico; Vipperla, Ravichander; Evans, Nicholas WD; Fauve, Benoit

EUSIPCO 2012, European Signal Processing Conference, August, 27-31, 2012, Bucharest, Romania

Automatic speaker verification (ASV) systems are increasingly being used for biometric authentication even if their vulnerability to imposture or spoofing is now widely acknowledged. Recent work has proposed different spoofing approaches which can be used to test vulnerabilities. This paper introduces a new approach based on artificial, tone-like signals which provoke higher ASV scores than genuine client tests. Experimental results show degradations in the equal error rate from 8.5% to 77.3% and from 4.8% to 64.3% for standard Gaussian mixture model and factor analysis based ASV systems respectively. These findings demonstrate the importance of efforts to develop dedicated countermeasures, some of them trivial, to protect ASV systems from spoofing.

Document Hal Bibtex

Keywords:biometrics, speaker verification, spoofing, imposture
Type:Conference
Language:English
City:Bucharest
Country:ROMANIA
Date:
Department:Multimedia Communications
Eurecom ref:3730
Copyright: © EURASIP. Personal use of this material is permitted. The definitive version of this paper was published in EUSIPCO 2012, European Signal Processing Conference, August, 27-31, 2012, Bucharest, Romania and is available at :
Bibtex: @inproceedings{EURECOM+3730, year = {2012}, title = {{O}n the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals}, author = {{A}legre, {F}ederico and {V}ipperla, {R}avichander and {E}vans, {N}icholas {WD} and {F}auve, {B}enoit}, booktitle = {{EUSIPCO} 2012, {E}uropean {S}ignal {P}rocessing {C}onference, {A}ugust, 27-31, 2012, {B}ucharest, {R}omania}, address = {{B}ucharest, {ROMANIA}}, month = {08}, url = {http://www.eurecom.fr/publication/3730} }
See also: