Abstract
In this paper, we describe a system for detecting spoofing attacks on speaker verification systems. By spoofing we mean an attempt to impersonate a legitimate user. We focus on detecting if the test segment is a far-field microphone recording of the victim. This kind of attack is of critical importance in security applications like access to bank accounts. We present experiments on databases created for this purpose, including land line and GSM telephone channels. We present spoofing detection results with EER between 0% and 9% depending on the condition. We show the degradation on the speaker verification performance in the presence of this kind of attack and how to use the spoofing detection to mitigate that degradation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Reynolds, D.A., Quatieri, T.F., Dunn, R.B.: Speaker Verification Using Adapted Gaussian Mixture Models. Digital Signal Processing 10(1-3), 19–41 (2000)
Kenny, P., Ouellet, P., Dehak, N., Gupta, V., Dumouchel, P.: A Study of Interspeaker Variability in Speaker Verification. IEEE Transactions on Audio, Speech, and Language Processing 16(5), 980–988 (2008)
http://www.itl.nist.gov/iad/mig/tests/sre/2010/NIST_SRE10_evalplan.r6.pdf
Perrot, P., Aversano, G., Chollet, G.: Voice disguise and automatic detection: review and perspectives. Lecture Notes In Computer Science, pp. 101–117 (2007)
Perrot, P., Aversano, G., Blouet, R., Charbit, M., Chollet, G.: Voice Forgery Using ALISP: Indexation in a Client Memory. In: Proceedings (ICASSP 2005). IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 17–20. IEEE, Los Alamitos (2005)
De Leon, P.L., Pucher, M., Yamagishi, J.: Evaluation of the vulnerability of speaker verification to synthetic speech. In: Proceedings of Odyssey 2010 - The Speaker and Language Recognition Workshop, Brno, Czech Republic (2010)
Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001)
Pelecanos, J., Sridharan, S.: Feature warping for robust speaker verification. In: Oddyssey Speaker and Language Recognition Workshop, Crete, Greece (2001)
Glembek, O., Burget, L., Dehak, N., Brummer, N., Kenny, P.: Comparison of scoring methods used in speaker recognition with Joint Factor Analysis. In: ICASSP 2009: Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, Washington, DC, USA, 2009, pp. 4057–4060. IEEE Computer Society, Los Alamitos (2009)
Brummer, N.: http://sites.google.com/site/nikobrummer/focalbilinear
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Villalba, J., Lleida, E. (2011). Detecting Replay Attacks from Far-Field Recordings on Speaker Verification Systems. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds) Biometrics and ID Management. BioID 2011. Lecture Notes in Computer Science, vol 6583. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19530-3_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-19530-3_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19529-7
Online ISBN: 978-3-642-19530-3
eBook Packages: Computer ScienceComputer Science (R0)