Abstract
This article is the proceeding of the priority research direction of the voice biometrics systems spoofing problem. We continue exploring speech synthesis spoofing attacks based on creating a text-to-speech voice. In our work we focused on the completely automatic way to create new voices for text-to-speech system and the investigation of the state-of-art spoofing detection system vulnerability to this spoofing attacks. Results obtained during our experiments demonstrate that 10 seconds of speech material is enough for EER increasement up to 19.67 %. Considering the fact, that automatic method for synthesis voiced training allows perpetrators to increase the amount of spoofing attacks to biometric systems, we raise the issue of relevance of a new type of spoofing attack, and development of the effective methods to detect it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wu, Z., et al.: Spoofing and countermeasures for speaker verification: a survey. Speech Commun. 66, 130–153 (2015)
Matveev, Y.N.: Biometric technologies of person identification by voice and other modalities. Vestnik MGTU. Priborostroenie 3(3), 46–61 (2012)
Kozlov, A., Kudashev, O., Matveev, Y., Pekhovsky, T., Simonchik, K., Shulipa, A.: SVID speaker recognition system for NIST SRE 2012. In: Železný, M., Habernal, I., Ronzhin, A. (eds.) SPECOM 2013. LNCS, vol. 8113, pp. 278–285. Springer, Heidelberg (2013)
Novoselov, S., Pekhovsky, T., Simonchik, K.: STC speaker recognition system for the NIST i-vector challenge. In: Proceedings of the Odyssey 2014 - The Speaker and Language Recognition Workshop (2014)
Villalba, E., Lleida, E.: Speaker verification performance degradation against spoofing and tampering attacks. In: Proceedings of the FALA 2010 Workshop, pp. 131–134 (2010)
Shchemelinin, V., Topchina, M., Simonchik, K.: Vulnerability of voice verification systems to spoofing attacks by TTS voices based on automatically labeled telephone speech. In: Ronzhin, A., Potapova, R., Delic, V. (eds.) SPECOM 2014. LNCS, vol. 8773, pp. 475–481. Springer, Heidelberg (2014). (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Marcel, S., Nixon, M.S., Li, S.Z.: Handbook of Biometric Anti-spoofing: Trusted Biometrics Under Spoofing Attacks. Springer, New York (2014)
Wu, Z., et al.: ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge 2015. http://www.spoofingchallenge.org/is2015_asvspoof.pdf
Novoselov, S., et al.: STC Anti-spoofing systems for the ASVspoof 2015 challenge. http://ris.ifmo.ru/wp-content/uploads/2015/06/Technical_report_ASVspoof2015_STC.pdf
Dehak, N., et al. : Support vector machines versus fast scoring in the low-dimensional total variability space for speaker verification. In: Proceedings of the Interspeech, pp. 1559–1562 (2009)
Chistikov, P., Korolkov, E.: Data-driven speech parameter generation for russian text-to-speech system. computational linguistics and intellectual technologies. In: Proceedings of the Annual International Conference “Dialogue”, Issue 11(18), vol. 1. pp. 103–111 (2012)
Simonchik, K., Shchemelinn, V.: “STC SPOOFING” database for text-dependent speaker recognition evaluation. In: Proceedings of SLTU-2014 Workshop St. Petersburg, Russia, pp. 221–224 (2014)
Tomashenko, N.A., Khokhlov, Y.Y.: Fast algorithm for automatic alignment of speech and imperfect text data. In: Železný, M., Habernal, I., Ronzhin, A. (eds.) SPECOM 2013. LNCS, vol. 8113, pp. 146–153. Springer, Heidelberg (2013)
Solomennik, A., Chistikov, P., Rybin, S., Talanov, A., Tomashenko, N.: Automation of new voice creation procedure for a russian TTS system. Vestnik MGTU. Priborostroenie 2, 29–32 (2013)
Yamagishi, J., et al.: Analysis of speaker adaptation algorithms for HMM-based speech synthesis and a constrained smaplr adaptation algorithm, IEEE Trans. Audio, Speech Lang. Process. 17(1), 66–83 (2009)
Wu, Z., et al.: A study on replay attack and anti-spoofing for text-dependent speaker verification. In: Proceedings of the Asia-Pacific Signal Information Processing Association Annual Summit and Conference (APSIPA ASC) (2014)
Acknowledgments
This work was partially nancially supported by the Government of Russian Federation, Grant 074-U01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Lavrentyeva, G., Kozlov, A., Novoselov, S., Simonchik, K., Shchemelinin, V. (2015). Automatically Trained TTS for Effective Attacks to Anti-spoofing System. In: Ronzhin, A., Potapova, R., Fakotakis, N. (eds) Speech and Computer. SPECOM 2015. Lecture Notes in Computer Science(), vol 9319. Springer, Cham. https://doi.org/10.1007/978-3-319-23132-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-23132-7_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23131-0
Online ISBN: 978-3-319-23132-7
eBook Packages: Computer ScienceComputer Science (R0)