ISCA Archive Interspeech 2013
ISCA Archive Interspeech 2013

Voice transformation-based spoofing of text-dependent speaker verification systems

Zvi Kons, Hagai Aronowitz

In the past few years state-of-the-art text-dependent speaker verification technology has improved significantly in terms of the ability to accept target speakers and reject imposters. As a result, the use of speaker verification systems for real world security is increasing. Real world usage of speaker verification technology raises the issue of spoofing attacks. As part of our efforts for developing countermeasures for such attacks, we describe in this paper a spoofing attack based on simple voice transformation and report an analysis of the vulnerability of several state-of-the-art text-dependent algorithms to such an attack.


doi: 10.21437/Interspeech.2013-292

Cite as: Kons, Z., Aronowitz, H. (2013) Voice transformation-based spoofing of text-dependent speaker verification systems. Proc. Interspeech 2013, 945-949, doi: 10.21437/Interspeech.2013-292

@inproceedings{kons13_interspeech,
  author={Zvi Kons and Hagai Aronowitz},
  title={{Voice transformation-based spoofing of text-dependent speaker verification systems}},
  year=2013,
  booktitle={Proc. Interspeech 2013},
  pages={945--949},
  doi={10.21437/Interspeech.2013-292}
}