Skip to main content

2018 | OriginalPaper | Buchkapitel

Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Automatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming that original voice can be distinguished from its played back version through the analysis of local texture patterns. We propose improvements to the state-of-the-art solution, but also show its severe limitations. This in turn leads to the fundamental question: is it possible to find one set of features which are characteristic for all playback recordings? We look for the answer by performing a series of optimization experiments, but in general the problem remains open.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wu, Z., Kinnunen, T., Evans, N., Yamagishi, J., Hanilci, C., Sahidullah, M., Sizov, A.: ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. In: Interspeech 2015, Dresden, pp. 2037–2041 (2015) Wu, Z., Kinnunen, T., Evans, N., Yamagishi, J., Hanilci, C., Sahidullah, M., Sizov, A.: ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. In: Interspeech 2015, Dresden, pp. 2037–2041 (2015)
2.
Zurück zum Zitat Janicki, A., Alegre, F., Evans, N.: An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks. Secur. Comm. Netw. 9, 3030–3044 (2016)CrossRef Janicki, A., Alegre, F., Evans, N.: An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks. Secur. Comm. Netw. 9, 3030–3044 (2016)CrossRef
3.
Zurück zum Zitat Villalba, J., Lleida, E.: Preventing replay attacks on speaker verification systems. In: IEEE International Carnahan Conference on Security Technology, Barcelona (2011) Villalba, J., Lleida, E.: Preventing replay attacks on speaker verification systems. In: IEEE International Carnahan Conference on Security Technology, Barcelona (2011)
4.
Zurück zum Zitat Wang, Z.-F., Wei, G., He, Q.-H.: Channel pattern noise based playback attack detection algorithm for speaker recognition. In: International Conference on Machine Learning and Cybernetics, vol. 4, Guilin, pp. 1708–1713 (2011) Wang, Z.-F., Wei, G., He, Q.-H.: Channel pattern noise based playback attack detection algorithm for speaker recognition. In: International Conference on Machine Learning and Cybernetics, vol. 4, Guilin, pp. 1708–1713 (2011)
5.
Zurück zum Zitat Shiota, S., Villavicencio, F., Yamagishi, J., Ono, N., Echizen, I., Matsui, T.: Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. In: Interspeech 2015, Dresden, pp. 239–243 (2015) Shiota, S., Villavicencio, F., Yamagishi, J., Ono, N., Echizen, I., Matsui, T.: Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. In: Interspeech 2015, Dresden, pp. 239–243 (2015)
6.
Zurück zum Zitat Gałka, J., Grzywacz, M., Samborski, R.: Playback attack detection for text-dependent speaker verification over telephone channels. Speech Commun. 67, 143–153 (2015)CrossRef Gałka, J., Grzywacz, M., Samborski, R.: Playback attack detection for text-dependent speaker verification over telephone channels. Speech Commun. 67, 143–153 (2015)CrossRef
7.
Zurück zum Zitat Yu, G., Slotine, J.-J.: Audio classification from time-frequency texture. In: IEEE International Conference on Acoustics, Speech and Signal Processing, Taipei, pp. 1677–1680 (2009) Yu, G., Slotine, J.-J.: Audio classification from time-frequency texture. In: IEEE International Conference on Acoustics, Speech and Signal Processing, Taipei, pp. 1677–1680 (2009)
8.
Zurück zum Zitat Maka, T., Forczmański, P.: Environmental sounds recognition based on image processing methods. In: Burduk, R., Jackowski, K., Kurzyński, M., Woźniak, M., Żołnierek, A. (eds.) Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015. AISC, vol. 403, pp. 723–732. Springer, Cham (2016). doi:10.1007/978-3-319-26227-7_68 CrossRef Maka, T., Forczmański, P.: Environmental sounds recognition based on image processing methods. In: Burduk, R., Jackowski, K., Kurzyński, M., Woźniak, M., Żołnierek, A. (eds.) Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015. AISC, vol. 403, pp. 723–732. Springer, Cham (2016). doi:10.​1007/​978-3-319-26227-7_​68 CrossRef
9.
Zurück zum Zitat Forczmański, P.: Evaluation of singer’s voice quality by means of visual pattern recognition. J. Voice 30(1), 127.e21–127.e30 (2016)CrossRef Forczmański, P.: Evaluation of singer’s voice quality by means of visual pattern recognition. J. Voice 30(1), 127.e21–127.e30 (2016)CrossRef
10.
Zurück zum Zitat Ojala, T., Pietikainen, M., Harwood, D.: A comparative study of texture measures with classification based on featured distributions. Pattern Recogn. 29, 51–59 (1996)CrossRef Ojala, T., Pietikainen, M., Harwood, D.: A comparative study of texture measures with classification based on featured distributions. Pattern Recogn. 29, 51–59 (1996)CrossRef
11.
Zurück zum Zitat Tan, X., Triggs, B.: Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Trans. Img. Proc. 19, 1635–1650 (2011)MathSciNet Tan, X., Triggs, B.: Enhanced local texture feature sets for face recognition under difficult lighting conditions. IEEE Trans. Img. Proc. 19, 1635–1650 (2011)MathSciNet
12.
Zurück zum Zitat Smiatacz, M., Rumiński, J.: Local texture pattern selection for efficient face recognition and tracking. In: Burduk, R., Jackowski, K., Kurzyński, M., Woźniak, M., Żołnierek, A. (eds.) Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015. AISC, vol. 403, pp. 359–368. Springer, Cham (2016). doi:10.1007/978-3-319-26227-7_34 CrossRef Smiatacz, M., Rumiński, J.: Local texture pattern selection for efficient face recognition and tracking. In: Burduk, R., Jackowski, K., Kurzyński, M., Woźniak, M., Żołnierek, A. (eds.) Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015. AISC, vol. 403, pp. 359–368. Springer, Cham (2016). doi:10.​1007/​978-3-319-26227-7_​34 CrossRef
Metadaten
Titel
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
verfasst von
Maciej Smiatacz
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-59162-9_13