z-logo
open-access-imgOpen Access
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
Author(s) -
Janicki Artur,
Alegre Federico,
Evans Nicholas
Publication year - 2016
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.1499
Subject(s) - computer science , spoofing attack , replay attack , spectrogram , context (archaeology) , speech recognition , probabilistic logic , field (mathematics) , computer security , artificial intelligence , authentication (law) , paleontology , mathematics , biology , pure mathematics
This paper analyses the threat of replay spoofing or presentation attacks in the context of automatic speaker verification. As relatively high‐technology attacks, speech synthesis and voice conversion, which have thus far received far greater attention in the literature, are probably beyond the means of the average fraudster. The implementation of replay attacks, in contrast, requires no specific expertise nor sophisticated equipment. Replay attacks are thus likely to be the most prolific in practice, while their impact is relatively under‐researched. The work presented here aims to compare at a high level the threat of replay attacks with those of speech synthesis and voice conversion. The comparison is performed using strictly controlled protocols and with six different automatic speaker verification systems including a state‐of‐the‐art iVector/probabilistic linear discriminant analysis system. Experiments show that low‐effort replay attacks present at least a comparable threat to speech synthesis and voice conversion. The paper also describes and assesses two replay attack countermeasures. A relatively new approach based on the local binary pattern analysis of speech spectrograms is shown to outperform a competing approach based on the detection of far‐field recordings. Copyright © 2016 John Wiley & Sons, Ltd.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here