Publication:
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data

dc.contributor.authorKhodabakhsh, Ali
dc.contributor.authorMohammadi, Amir
dc.contributor.authorDemiroğlu, Cenk
dc.contributor.departmentElectrical & Electronics Engineering
dc.contributor.ozuauthorDEMİROĞLU, Cenk
dc.contributor.ozugradstudentKhodabakhsh, Ali
dc.contributor.ozugradstudentMohammadi, Amir
dc.date.accessioned2017-02-20T11:27:34Z
dc.date.available2017-02-20T11:27:34Z
dc.date.issued2017-03
dc.description.abstractState-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. Here, as opposed to developing new detectors, we investigate new attack strategies. Investigating new techniques that are specifically tailored for spoofing attacks that can spoof the voice verification system and are difficult to detect is expected to increase the security of voice verification systems by enabling the development of better detectors. First, we investigated the vulnerability of an i-vector based verification system to attacks using statistical speech synthesis (SSS), with a particular focus on the case where the attacker has only a very limited amount of data from the target speaker. Even with a single adaptation utterance, the false alarm rate was found to be 23%. Still, SSS-generated speech is easy to detect (Wu et al., 2015a, 2015b), which dramatically reduces its effectiveness. For more effective attacks with limited data, we propose a hybrid statistical/concatenative synthesis approach and show that hybrid synthesis significantly increases the false alarm rate in the verification system compared to the baseline SSS method. Moreover, proposed hybrid synthesis makes detecting synthetic speech more difficult compared to SSS even when very limited amount of original speech recordings are available to the attacker. To further increase the effectiveness of the attacks, we propose a linear regression method that transforms synthetic features into more natural features. Even though the regression approach is more effective at spoofing the detectors, it is not as effective as the hybrid synthesis approach in spoofing the verification system. An interpolation approach is proposed to combine the linear regression and hybrid synthesis methods, which is shown to provide the best spoofing performance in most cases.en_US
dc.identifier.doi10.1016/j.csl.2016.08.004en_US
dc.identifier.endpage37en_US
dc.identifier.issn0885-2308en_US
dc.identifier.scopus2-s2.0-84986909494
dc.identifier.startpage20en_US
dc.identifier.urihttp://hdl.handle.net/10679/4799
dc.identifier.urihttps://doi.org/10.1016/j.csl.2016.08.004
dc.identifier.volume42en_US
dc.identifier.wos000390501300002
dc.language.isoengen_US
dc.peerreviewedyesen_US
dc.publicationstatuspublisheden_US
dc.publisherElsevieren_US
dc.relation.ispartofComputer Speech & Languageen_US
dc.rightsrestrictedAccess
dc.subject.keywordsStatistical speech synthesisen_US
dc.subject.keywordsHybrid speech synthesisen_US
dc.subject.keywordsSpoofing verification systemsen_US
dc.subject.keywordsSpeaker adaptationen_US
dc.subject.keywordsSynthetic speech detectionen_US
dc.titleSpoofing voice verification systems with statistical speech synthesis using limited adaptation dataen_US
dc.typearticleen_US
dspace.entity.typePublication
relation.isOrgUnitOfPublication7b58c5c4-dccc-40a3-aaf2-9b209113b763
relation.isOrgUnitOfPublication.latestForDiscovery7b58c5c4-dccc-40a3-aaf2-9b209113b763

Files

License bundle

Now showing 1 - 1 of 1
Placeholder
Name:
license.txt
Size:
1.45 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections