Anti-Spoofing for Text Independent Speaker Verification
Keywords:
MATLAB, Automatic Speaker Verification (ASV).Abstract
This paper describes the scientific study of vulnerability of automatic speaker verification to various vary of spoofing attacks. We start with radical analysis of the spoofing effects of five speech syntheses and eight voice conversion system and also the vulnerability of three speaker verification system under those attacks. Then we introduce variety of countermeasures to prevent the spoofing attacks from the each noted and unknown attackers. Known attacker’s square measure spoofing system those output was used to train the countermeasures, whereas associate unknown assailant is a spoofing system whose output offers to the countermeasures during coaching. Finally we describe benchmark automatic system against human performance on each speaker verification and spoofing deduction task. The main objective of the proposed method is to protect from the spoofing attack for text independent speaker verification.
References
- Z. Wu et al., "SAS: A speaker verification spoofing database containing diverse attacks," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), 2015.
- M. Wester, Z. Wu, and J. Yamagishi, "Human vs machine spoofing detection on wideband and narrowband data," in Proc. Interspeech, 2015.
- P. Golden, "Voice biometrics–The Asia Pacific experience," Biom. Technol. Today, vol. 2012, no. 4, pp. 10–11, 2012.
- M. Khitrov, "Talking passwords: Voice biometrics for data access and security," Biom. Technol. Today, vol. 2013, no. 2, pp. 9–11, 2013.
- B. Beranek, "Voice biometrics: Success stories, success factors and what’s next," Biom. Technol. Today, vol. 2013, no. 7, pp. 9–11, 2013.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.