{"title":"Security against morphed speech based on speaker verification system","authors":"Nikunj Tahilramani, N. Bhatt","doi":"10.1109/ICATCCT.2017.8389147","DOIUrl":null,"url":null,"abstract":"Speaker Verification systems needs to be robust over Morphed or Converted voice. There is possibility of Spoofing attack so to prevent that kind of attack and make surety of the system is big challenge. The main goal of the proposed system is to correctly identify the speaker and preventing the system from the morphing attack to ensure the authenticity, by using security. Morphing is performed by Pitch Synchronous Overlap and Add (PSOLA) method and Verification is performed by Correlation method, in that feature extraction is performed by MFCC and LPC method. Watermarking is performed with the blind detection and DM-QIM is used for watermarking process. In order to evaluate the overall performance of implemented algorithm, Identification rate, ABX test, and WSR are used.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICATCCT.2017.8389147","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Speaker Verification systems needs to be robust over Morphed or Converted voice. There is possibility of Spoofing attack so to prevent that kind of attack and make surety of the system is big challenge. The main goal of the proposed system is to correctly identify the speaker and preventing the system from the morphing attack to ensure the authenticity, by using security. Morphing is performed by Pitch Synchronous Overlap and Add (PSOLA) method and Verification is performed by Correlation method, in that feature extraction is performed by MFCC and LPC method. Watermarking is performed with the blind detection and DM-QIM is used for watermarking process. In order to evaluate the overall performance of implemented algorithm, Identification rate, ABX test, and WSR are used.