A Novel Approach Towards Generalization of Countermeasure for Spoofing Attack on ASV Systems

被引:6
|
作者
Kumar, Suvidha Rupesh [1 ]
Bharathi, B. [1 ]
机构
[1] SSN Coll Engn, Dept CSE, Chennai, Tamil Nadu, India
关键词
Spoof attack; Automatic speaker verification system; Logical access condition; Physical access condition; Filter-based cepstral coefficients; ASVspoof2019;
D O I
10.1007/s00034-020-01501-y
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Automatic speaker verification (ASV) system is a voice-based biometric authentication system susceptible to attacks from spoofed/fake utterances generated using speech synthesis, voice conversion and record-replay to gain fraudulent access through the system. Development of a generalized countermeasure to detect all such attacks is a major concern to the research community today. This paper presents a new feature named filter-based cepstral coefficient (FBCC) used in the front-end processing of the countermeasure. FBCC is cepstral coefficients of discrete cosine transformed log compressed energy variations of presented utterances. The energy variation patterns (EVPs) are captured by applying statistical filters to the power spectral density of utterance presented to the ASV system. Cepstral coefficients retrieved from EVP tend to capture artefacts that well discriminates spoofed from bonafide utterances. The robustness of FBCC in projecting the traces of spoof attack in the utterances is evident through the empirical results obtained when tested on ASVspoof2019 corpus with the conventional Gaussian mixture model classifier. The performance of the countermeasure using FBCC is consistently good throughout all the presented attacks, thus achieving generalization. This FBCC-based countermeasure performed equally good under both logical access (LA) and physical access (PA) conditions. The best performance of FBCC-based countermeasure, when tested with different filters, using t-DCF (tandem detection cost function) metric is 0.00 and 0.16 for development and evaluation data, respectively, under LA condition and is 0.18 and 0.25 for development and evaluation data, respectively, under PA condition.
引用
收藏
页码:872 / 889
页数:18
相关论文
共 50 条
  • [31] A novel countermeasure technique for reactive jamming attack in internet of things
    Alaba Ayotunde Fadele
    Mazliza Othman
    Ibrahim Abaker Targio Hashem
    Ibrar Yaqoob
    Muhammad Imran
    Muhammad Shoaib
    Multimedia Tools and Applications, 2019, 78 : 29899 - 29920
  • [32] An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems
    Xiong, Qi
    Liang, Ying-Chang
    Li, Kwok Hung
    Gong, Yi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 932 - 940
  • [33] A novel countermeasure technique for reactive jamming attack in internet of things
    Fadele, Alaba Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Yaqoob, Ibrar
    Imran, Muhammad
    Shoaib, Muhammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) : 29899 - 29920
  • [34] Countermeasure for Smart Jamming Threat: A Deceptively Adversarial Attack Approach
    Li, Wei
    Wang, Jun
    Li, Li
    Chen, Xiaonan
    Huang, Wei
    Li, Shaoqian
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [35] False Data Injection Attack and Corresponding Countermeasure in Multienergy Systems
    Zhang, Qiwei
    Li, Fangxing
    Zhao, Jin
    She, Buxin
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2024, 39 (02) : 3537 - 3547
  • [36] Characterizing Radar Network Traffic: a first step towards spoofing attack detection
    de Riberolles, Theobald
    Song, Jiefu
    Zou, Yunkai
    Silvestre, Guthemberg
    Larrieu, Nicolas
    2020 IEEE AEROSPACE CONFERENCE (AEROCONF 2020), 2020,
  • [37] Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack
    Zhang, Chaoqin
    Hu, Guangwu
    Chen, Guolong
    Sangaiah, Arun Kumar
    Zhang, Ping'an
    Yan, Xia
    Jiang, Weijin
    IEEE ACCESS, 2018, 6 : 22764 - 22777
  • [38] Detecting Link Correlation Spoofing Attack: A Beacon-Trap Approach
    Shen, Hang
    Xu, Jiajia
    Wang, Tianjing
    Bai, Guangwei
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [39] Pilot Spoofing Attack Detection and Downlink Precoding in Massive MIMO Systems
    Wang, Wei
    Yin, Zhisheng
    Lyu, Feng
    Wu, Huaqing
    Wu, Qihui
    Shen, Xuemin
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [40] Biometrics Systems Under Spoofing Attack [An evaluation methodology and lessons learned]
    Hadid, Abdenour
    Evans, Nicholas
    Marcel, Sebastien
    Fierrez, Julian
    IEEE SIGNAL PROCESSING MAGAZINE, 2015, 32 (05) : 20 - 30