Diffusion-Based Adversarial Purification for Speaker Verification

被引:0
|
作者
Bai, Yibo [1 ]
Zhang, Xiao-Lei [2 ,3 ,4 ]
Li, Xuelong [3 ]
机构
[1] Univ Hong Kong, Dept Elect & Elect Engn, Hong Kong, Peoples R China
[2] Northwestern Polytech Univ, Sch Marine Sci & Technol, Xian 710072, Peoples R China
[3] China Telecom Corp Ltd, Inst Artificial Intelligence TeleAI, Beijing 100033, Peoples R China
[4] Northwestern Polytech Univ, Res & Dev Inst, Shenzhen 518063, Peoples R China
关键词
Purification; Perturbation methods; Noise reduction; Acoustics; Training; Security; Diffusion processes; Adversarial defense; diffusion model; speaker verification;
D O I
10.1109/LSP.2024.3418715
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, automatic speaker verification (ASV) based on deep learning is easily contaminated by adversarial attacks, which is a new type of attack that injects imperceptible perturbations to audio signals so as to make ASV produce wrong decisions. This poses a significant threat to the security and reliability of ASV systems. To address this issue, we propose a Diffusion-Based Adversarial Purification (DAP) method that enhances the robustness of ASV systems against such adversarial attacks. Our method leverages a conditional denoising diffusion probabilistic model to effectively purify the adversarial examples and mitigate the impact of perturbations. DAP first introduces controlled noise into adversarial examples, and then performs a reverse denoising process to reconstruct clean audio. Experimental results demonstrate the efficacy of the proposed DAP in enhancing the security of ASV and meanwhile minimizing the distortion of the purified audio signals.
引用
收藏
页码:2300 / 2304
页数:5
相关论文
共 50 条
  • [21] Adversarial Training Based on Meta-Learning in Unseen Domains for Speaker Verification
    Zhang, Jian-Tao
    Fang, Xin
    Li, Jin
    Song, Yan
    Dai, Li-Rong
    MAN-MACHINE SPEECH COMMUNICATION, NCMMSC 2022, 2023, 1765 : 124 - 131
  • [22] ADVERSARIAL ATTACKS ON GMM I-VECTOR BASED SPEAKER VERIFICATION SYSTEMS
    Li, Xu
    Zhong, Jinghua
    Wu, Xixin
    Yu, Jianwei
    Liu, Xunying
    Meng, Helen
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 6579 - 6583
  • [23] Diffusion Models for Adversarial Purification
    Nie, Weili
    Guo, Brandon
    Huang, Yujia
    Xiao, Chaowei
    Vahdat, Arash
    Anandkumar, Anima
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 162, 2022,
  • [24] Voting for the right answer: Adversarial defense for speaker verification
    Wu, Haibin
    Zhang, Yang
    Wu, Zhiyong
    Wang, Dong
    Lee, Hung-yi
    INTERSPEECH 2021, 2021, : 4294 - 4298
  • [25] Ensemble Adversarial Defenses and Attacks in Speaker Verification Systems
    Chen, Zesheng
    Li, Jack
    Chen, Chao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 32645 - 32655
  • [26] Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference
    Luo, Hongwei
    Shen, Yijie
    Lin, Feng
    Xu, Guoai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [27] ADVERSARIAL ATTACKS ON SPOOFING COUNTERMEASURES OF AUTOMATIC SPEAKER VERIFICATION
    Liu, Songxiang
    Wu, Haibin
    Lee, Hung-yi
    Meng, Helen
    2019 IEEE AUTOMATIC SPEECH RECOGNITION AND UNDERSTANDING WORKSHOP (ASRU 2019), 2019, : 312 - 319
  • [28] Signal Processing Interpretation for Adversarial Examples in Speaker Verification
    Sankala, Sreekanth
    Kodukula, Sri Rama Murty
    Narayana, Yegna B.
    2024 NATIONAL CONFERENCE ON COMMUNICATIONS, NCC, 2024,
  • [29] On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems
    Chen, Zesheng
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 16271 - 16283
  • [30] Defending Against Adversarial Attacks in Speaker Verification Systems
    Chang, Li-Chi
    Chen, Zesheng
    Chen, Chao
    Wang, Guoping
    Bi, Zhuming
    2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,