Vulnerability in speaker verification - a study of technical impostor techniques
نویسندگان
چکیده
This paper reports on some ways to try to deceive a state-of-the-art speaker verification (SV) system. In order to evaluate the risk in SV systems one has to take into account the possible intentional impostors who know whom they are attacking. We defined a worst case scenario where the impostor has extensive knowledge about the person to deceive as well as the system to attack. In this framework we tested our SV system against concatenated client speech, re-synthesis of the client speech and diphone synthesis of the client.
منابع مشابه
Vulnerability in Speaker Verification – a Study of Technical Impostor Techniques
This paper reports on some ways to try to deceive a state-of-the-art speaker verification (SV) system. In order to evaluate the risk in SV systems one has to take into account the possible intentional impostors who know whom they are attacking. We defined a worst case scenario where the impostor has extensive knowledge about the person to deceive as well as the system to attack. In this framewo...
متن کاملSpeaking faces for face-voice spe
In this paper, we describe an approach for an animated speaking face synthesis and its application in modeling impostor/replay attack scenarios for face-voice based speaker verification systems. The speaking face reported here learns the spatiotemporal relationship between speech acoustics and MPEG4 compliant facial animation points. The influence of articulatory, perceptual, and prosodic acous...
متن کاملSkilled Impostor Attacks Against Fingerprint Verification Systems And Its Remedy
Fingerprint verification systems are becoming ubiquitous in everyday life. This trend is propelled especially by the proliferation of mobile devices with fingerprint sensors such as smartphones and tablet computers, and fingerprint verification is increasingly applied for authenticating financial transactions. In this study we describe a novel attack vector against fingerprint verification syst...
متن کاملImproved GMM-based speaker verification using SVM-driven impostor dataset selection
The problem of impostor dataset selection for GMM-based speaker verification is addressed through the recently proposed data-driven background dataset refinement technique. The SVM-based refinement technique selects from a candidate impostor dataset those examples that are most frequently selected as support vectors when training a set of SVMs on a development corpus. This study demonstrates th...
متن کاملA new score normalization method for speaker verification with virtual impostor model
User authentication system using a smart card or authentication token is drawing more and more attention. The limitation of the size of the RAM inside the processor for user authentication necessitates a verification algorithm with the efficient usage of the memory. In this paper, we present a score normalization method, which is suitable for embedded speaker verification system. Proposed score...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999