Skip to main content

2015 | OriginalPaper | Buchkapitel

Automatically Trained TTS for Effective Attacks to Anti-spoofing System

verfasst von : Galina Lavrentyeva, Alexandr Kozlov, Sergey Novoselov, Konstantin Simonchik, Vadim Shchemelinin

Erschienen in: Speech and Computer

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This article is the proceeding of the priority research direction of the voice biometrics systems spoofing problem. We continue exploring speech synthesis spoofing attacks based on creating a text-to-speech voice. In our work we focused on the completely automatic way to create new voices for text-to-speech system and the investigation of the state-of-art spoofing detection system vulnerability to this spoofing attacks. Results obtained during our experiments demonstrate that 10 seconds of speech material is enough for EER increasement up to 19.67 %. Considering the fact, that automatic method for synthesis voiced training allows perpetrators to increase the amount of spoofing attacks to biometric systems, we raise the issue of relevance of a new type of spoofing attack, and development of the effective methods to detect it.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wu, Z., et al.: Spoofing and countermeasures for speaker verification: a survey. Speech Commun. 66, 130–153 (2015)CrossRef Wu, Z., et al.: Spoofing and countermeasures for speaker verification: a survey. Speech Commun. 66, 130–153 (2015)CrossRef
2.
Zurück zum Zitat Matveev, Y.N.: Biometric technologies of person identification by voice and other modalities. Vestnik MGTU. Priborostroenie 3(3), 46–61 (2012) Matveev, Y.N.: Biometric technologies of person identification by voice and other modalities. Vestnik MGTU. Priborostroenie 3(3), 46–61 (2012)
3.
Zurück zum Zitat Kozlov, A., Kudashev, O., Matveev, Y., Pekhovsky, T., Simonchik, K., Shulipa, A.: SVID speaker recognition system for NIST SRE 2012. In: Železný, M., Habernal, I., Ronzhin, A. (eds.) SPECOM 2013. LNCS, vol. 8113, pp. 278–285. Springer, Heidelberg (2013) CrossRef Kozlov, A., Kudashev, O., Matveev, Y., Pekhovsky, T., Simonchik, K., Shulipa, A.: SVID speaker recognition system for NIST SRE 2012. In: Železný, M., Habernal, I., Ronzhin, A. (eds.) SPECOM 2013. LNCS, vol. 8113, pp. 278–285. Springer, Heidelberg (2013) CrossRef
4.
Zurück zum Zitat Novoselov, S., Pekhovsky, T., Simonchik, K.: STC speaker recognition system for the NIST i-vector challenge. In: Proceedings of the Odyssey 2014 - The Speaker and Language Recognition Workshop (2014) Novoselov, S., Pekhovsky, T., Simonchik, K.: STC speaker recognition system for the NIST i-vector challenge. In: Proceedings of the Odyssey 2014 - The Speaker and Language Recognition Workshop (2014)
5.
Zurück zum Zitat Villalba, E., Lleida, E.: Speaker verification performance degradation against spoofing and tampering attacks. In: Proceedings of the FALA 2010 Workshop, pp. 131–134 (2010) Villalba, E., Lleida, E.: Speaker verification performance degradation against spoofing and tampering attacks. In: Proceedings of the FALA 2010 Workshop, pp. 131–134 (2010)
6.
Zurück zum Zitat Shchemelinin, V., Topchina, M., Simonchik, K.: Vulnerability of voice verification systems to spoofing attacks by TTS voices based on automatically labeled telephone speech. In: Ronzhin, A., Potapova, R., Delic, V. (eds.) SPECOM 2014. LNCS, vol. 8773, pp. 475–481. Springer, Heidelberg (2014). (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Shchemelinin, V., Topchina, M., Simonchik, K.: Vulnerability of voice verification systems to spoofing attacks by TTS voices based on automatically labeled telephone speech. In: Ronzhin, A., Potapova, R., Delic, V. (eds.) SPECOM 2014. LNCS, vol. 8773, pp. 475–481. Springer, Heidelberg (2014). (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
7.
Zurück zum Zitat Marcel, S., Nixon, M.S., Li, S.Z.: Handbook of Biometric Anti-spoofing: Trusted Biometrics Under Spoofing Attacks. Springer, New York (2014)CrossRef Marcel, S., Nixon, M.S., Li, S.Z.: Handbook of Biometric Anti-spoofing: Trusted Biometrics Under Spoofing Attacks. Springer, New York (2014)CrossRef
10.
Zurück zum Zitat Dehak, N., et al. : Support vector machines versus fast scoring in the low-dimensional total variability space for speaker verification. In: Proceedings of the Interspeech, pp. 1559–1562 (2009) Dehak, N., et al. : Support vector machines versus fast scoring in the low-dimensional total variability space for speaker verification. In: Proceedings of the Interspeech, pp. 1559–1562 (2009)
11.
Zurück zum Zitat Chistikov, P., Korolkov, E.: Data-driven speech parameter generation for russian text-to-speech system. computational linguistics and intellectual technologies. In: Proceedings of the Annual International Conference “Dialogue”, Issue 11(18), vol. 1. pp. 103–111 (2012) Chistikov, P., Korolkov, E.: Data-driven speech parameter generation for russian text-to-speech system. computational linguistics and intellectual technologies. In: Proceedings of the Annual International Conference “Dialogue”, Issue 11(18), vol. 1. pp. 103–111 (2012)
12.
Zurück zum Zitat Simonchik, K., Shchemelinn, V.: “STC SPOOFING” database for text-dependent speaker recognition evaluation. In: Proceedings of SLTU-2014 Workshop St. Petersburg, Russia, pp. 221–224 (2014) Simonchik, K., Shchemelinn, V.: “STC SPOOFING” database for text-dependent speaker recognition evaluation. In: Proceedings of SLTU-2014 Workshop St. Petersburg, Russia, pp. 221–224 (2014)
13.
Zurück zum Zitat Tomashenko, N.A., Khokhlov, Y.Y.: Fast algorithm for automatic alignment of speech and imperfect text data. In: Železný, M., Habernal, I., Ronzhin, A. (eds.) SPECOM 2013. LNCS, vol. 8113, pp. 146–153. Springer, Heidelberg (2013) CrossRef Tomashenko, N.A., Khokhlov, Y.Y.: Fast algorithm for automatic alignment of speech and imperfect text data. In: Železný, M., Habernal, I., Ronzhin, A. (eds.) SPECOM 2013. LNCS, vol. 8113, pp. 146–153. Springer, Heidelberg (2013) CrossRef
14.
Zurück zum Zitat Solomennik, A., Chistikov, P., Rybin, S., Talanov, A., Tomashenko, N.: Automation of new voice creation procedure for a russian TTS system. Vestnik MGTU. Priborostroenie 2, 29–32 (2013) Solomennik, A., Chistikov, P., Rybin, S., Talanov, A., Tomashenko, N.: Automation of new voice creation procedure for a russian TTS system. Vestnik MGTU. Priborostroenie 2, 29–32 (2013)
15.
Zurück zum Zitat Yamagishi, J., et al.: Analysis of speaker adaptation algorithms for HMM-based speech synthesis and a constrained smaplr adaptation algorithm, IEEE Trans. Audio, Speech Lang. Process. 17(1), 66–83 (2009)CrossRef Yamagishi, J., et al.: Analysis of speaker adaptation algorithms for HMM-based speech synthesis and a constrained smaplr adaptation algorithm, IEEE Trans. Audio, Speech Lang. Process. 17(1), 66–83 (2009)CrossRef
16.
Zurück zum Zitat Wu, Z., et al.: A study on replay attack and anti-spoofing for text-dependent speaker verification. In: Proceedings of the Asia-Pacific Signal Information Processing Association Annual Summit and Conference (APSIPA ASC) (2014) Wu, Z., et al.: A study on replay attack and anti-spoofing for text-dependent speaker verification. In: Proceedings of the Asia-Pacific Signal Information Processing Association Annual Summit and Conference (APSIPA ASC) (2014)
Metadaten
Titel
Automatically Trained TTS for Effective Attacks to Anti-spoofing System
verfasst von
Galina Lavrentyeva
Alexandr Kozlov
Sergey Novoselov
Konstantin Simonchik
Vadim Shchemelinin
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-23132-7_17

Premium Partner