A new speaker verification spoofing countermeasure based on local binary patterns

被引:0
|
作者
Alegre, Federico [1 ]
Vipperla, Ravichander [2 ]
Amehraye, Asmaa [1 ]
Evans, Nicholas [1 ]
机构
[1] EURECOM, Multimedia Commun Dept, Sophia Antipolis, France
[2] Nuance Commun, Cambridge, England
基金
欧盟第七框架计划;
关键词
speaker verification; biometrics; imposture; countermeasures; local binary patterns; FREQUENCY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a new countermeasure for the protection of automatic speaker verification systems from spoofed, converted voice signals. The new countermeasure is based on the analysis of a sequence of acoustic feature vectors using Local Binary Patterns (LBPs). Compared to existing approaches the new countermeasure is less reliant on prior knowledge and affords robust protection from not only voice conversion, for which it is optimised, but also spoofing attacks from speech synthesis and artificial signals, all of which otherwise provoke significant increases in false acceptance. The work highlights the difficulty in detecting converted voice and also discusses the need for formal evaluations to develop new countermeasures which are less reliant on prior knowledge and thus more reflective of practical use cases.
引用
收藏
页码:940 / 944
页数:5
相关论文
共 50 条
  • [1] Backend Ensemble for Speaker Verification and Spoofing Countermeasure
    Zhang, Li
    Li, Yue
    Zhao, Huan
    Wang, Qing
    Xie, Lei
    INTERSPEECH 2022, 2022, : 4381 - 4385
  • [2] A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns
    Alegre, Federico
    Amehraye, Asmaa
    Evans, Nicholas
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2013,
  • [3] Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification
    Todisco, Massimiliano
    Delgado, Hector
    Evans, Nicholas
    COMPUTER SPEECH AND LANGUAGE, 2017, 45 : 516 - 535
  • [4] Towards Generating Adversarial Examples on Combined Systems of Automatic Speaker Verification and Spoofing Countermeasure
    Zhang, Xingyu
    Zhang, Xiongwei
    Zou, Xia
    Liu, Haibo
    Sun, Meng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] Speaker identification based on spectrogram and local binary patterns
    Li, Yuanyuan
    Wang, Yunfang
    Li, Penghua
    Feng, Huizong
    Journal of Computational Information Systems, 2015, 11 (08): : 2771 - 2778
  • [6] Spoofing and countermeasures for speaker verification: A survey
    Wu, Zhizheng
    Evans, Nicholas
    Kinnunen, Tomi
    Yamagishi, Junichi
    Alegre, Federico
    Li, Haizhou
    SPEECH COMMUNICATION, 2015, 66 : 130 - 153
  • [7] Spoofing and countermeasures for automatic speaker verification
    Evans, Nicholas
    Kinnunen, Tomi
    Yamagishi, Junichi
    14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5, 2013, : 925 - 929
  • [8] Spoofing and Countermeasures for Speaker Verification: A Review
    Anjum, Z. Khamar
    Swamy, R. Kumara
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 467 - 471
  • [9] Feature selection based on CQCCs for automatic speaker verification spoofing
    Wang, Xianliang
    Xiao, Yanhong
    Zhu, Xuan
    18TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2017), VOLS 1-6: SITUATED INTERACTION, 2017, : 32 - 36
  • [10] On the Vulnerability of Speaker Verification to Realistic Voice Spoofing
    Ergunay, Serife Kucur
    Khoury, Elie
    Lazaridis, Alexandros
    Marcel, Sebastien
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,