Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data

Achintya Kumar Sarkar, Md Sahidullah, Zheng-Hua Tan, Tomi Kinnunen

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

4 Citations (Scopus)
197 Downloads (Pure)

Abstract

Automatic speaker verification (ASV) systems are vulnerable to spoofing attacks using speech generated by voice conversion and speech synthesis techniques. Commonly, a countermeasure (CM) system is integrated with an ASV system for improved protection against spoofing attacks. But integration of the two systems is challenging and often leads to increased false rejection rates. Furthermore, the performance of CM severely degrades if in-domain development data are unavailable. In this study, therefore, we propose a solution that uses two separate background models – one from human speech and another from spoofed data. During test, the ASV score for an input utterance is computed as the difference of the log-likelihood against the target model and the combination of the log-likelihoods against two background models. Evaluation experiments are conducted using the joint ASV and CM protocol of ASVspoof 2015 corpus consisting of text-independent ASV tasks with short utterances. Our proposed system reduces error rates in the presence of spoofing attacks by using out-of-domain spoofed data for system development, while maintaining the performance for zero-effort imposter attacks compared to the baseline system.
Original languageEnglish
Title of host publicationInterspeech 2017
PublisherInternational Speech Communications Association
Publication date20 Aug 2017
Pages2611-2615
DOIs
Publication statusPublished - 20 Aug 2017
EventInterspeech 2017 - Stockholm, Sweden
Duration: 20 Aug 201724 Aug 2017
http://www.interspeech2017.org/

Conference

ConferenceInterspeech 2017
Country/TerritorySweden
CityStockholm
Period20/08/201724/08/2017
Internet address
SeriesINTERSPEECH
ISSN1990-9770

Keywords

  • Speaker Verification
  • Spoofing
  • UBM
  • Cross-corpora

Fingerprint

Dive into the research topics of 'Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data'. Together they form a unique fingerprint.

Cite this