Replay attack: Its effect on GMM-UBM based text-independent speaker verification system

Madhusudan Singh, Jagabandhu Mishra, D. Pati
{"title":"Replay attack: Its effect on GMM-UBM based text-independent speaker verification system","authors":"Madhusudan Singh, Jagabandhu Mishra, D. Pati","doi":"10.1109/UPCON.2016.7894726","DOIUrl":null,"url":null,"abstract":"Spoofing is a technique to bias the system decisions towards target speakers without the physical presence of genuines. The focus of spoofing is on target speakers, resulting a sharp increase in false acceptance. The availability of high quality recording and playback devices (i.e. smart phones), have made spoof attacks by replay data a most common and easy approach, even without much knowledge about speech processing. In this work we analyze and demonstrate the seriousness of replay attacks, and then examine the vulnerability of classic GMMUBM based speaker verification (SV) system to replay data by experimental studies. Since no standard database is available, we develop a replay dataset of 34 speakers from Indian Institute of Technology Guwahati - Multi-Variability (IITG-MV) speech database, that covers all kind of variabilities. To avoid any gender biasing, we made our studies for male and female speakers independently and finally in together. Under replay attacks, for genuine 459 male and 220 female trials, the equal error rate (EER) increases from 2.61% to 15.03% and 1.82% to 34.09%, respectively. In total, the EER increases from 2.50% to 20.76%. As obvious, the degradation in EER is mainly due to increase in false acceptance ratio (FAR). The case is worsen for female speakers. It may be due to the fine spectral structures of female speakers. These observations reveal that GMM-UBM based SV system is highly vulnerable to replay attacks and needs wider attentions.","PeriodicalId":151809,"journal":{"name":"2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UPCON.2016.7894726","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

Spoofing is a technique to bias the system decisions towards target speakers without the physical presence of genuines. The focus of spoofing is on target speakers, resulting a sharp increase in false acceptance. The availability of high quality recording and playback devices (i.e. smart phones), have made spoof attacks by replay data a most common and easy approach, even without much knowledge about speech processing. In this work we analyze and demonstrate the seriousness of replay attacks, and then examine the vulnerability of classic GMMUBM based speaker verification (SV) system to replay data by experimental studies. Since no standard database is available, we develop a replay dataset of 34 speakers from Indian Institute of Technology Guwahati - Multi-Variability (IITG-MV) speech database, that covers all kind of variabilities. To avoid any gender biasing, we made our studies for male and female speakers independently and finally in together. Under replay attacks, for genuine 459 male and 220 female trials, the equal error rate (EER) increases from 2.61% to 15.03% and 1.82% to 34.09%, respectively. In total, the EER increases from 2.50% to 20.76%. As obvious, the degradation in EER is mainly due to increase in false acceptance ratio (FAR). The case is worsen for female speakers. It may be due to the fine spectral structures of female speakers. These observations reveal that GMM-UBM based SV system is highly vulnerable to replay attacks and needs wider attentions.
重播攻击:对基于GMM-UBM的文本无关说话人验证系统的影响
欺骗是一种在没有真实存在的情况下使系统决策偏向目标演讲者的技术。欺骗的焦点集中在目标说话者身上,导致错误接受率急剧上升。高质量的录音和回放设备(即智能手机)的可用性使得通过回放数据进行欺骗攻击成为最常见和最简单的方法,即使没有太多关于语音处理的知识。在本文中,我们分析并论证了重放攻击的严重性,然后通过实验研究检验了经典的基于GMMUBM的说话人验证(SV)系统对重放数据的脆弱性。由于没有标准数据库可用,我们开发了一个来自印度理工学院古瓦哈蒂-多变异性(IITG-MV)语音数据库的34位演讲者的重播数据集,涵盖了所有类型的变异性。为了避免任何性别偏见,我们分别对男性和女性演讲者进行了研究,最后一起进行了研究。在重放攻击下,对于459名男性和220名女性的真实试验,相等错误率(EER)分别从2.61%增加到15.03%和1.82%增加到34.09%。总的来说,EER从2.50%增加到20.76%。很明显,EER的下降主要是由于误接受率(FAR)的增加。女性演讲者的情况更糟。这可能是由于女性说话者精细的频谱结构。这些观察结果表明,基于GMM-UBM的SV系统极易受到重放攻击,需要广泛关注。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信