ISCA Archive Interspeech 2013
ISCA Archive Interspeech 2013

Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints

Zhizheng Wu, Anthony Larcher, Kong Aik Lee, Eng Siong Chng, Tomi Kinnunen, Haizhou Li

Voice conversion, a technique to change one's voice to sound like that of another, poses a threat to even high performance speaker verification system. Vulnerability of text-independent speaker verification systems under spoofing attack, using statistical voice conversion technique, was evaluated and confirmed in our previous work. In this paper, we further extend the study to text-dependent speaker verification systems. In particular, we compare both joint density Gaussian mixture model (JD-GMM) and unit-selection (US) spoofing methods and, for the first time, the performances of text-independent and text-dependent speaker verification systems in a single study. We conduct the experiments using RSR2015 database which is recorded using multiple mobile devices. The experimental results indicate that text-dependent speaker verification system tolerates spoofing attacks better than the text-independent counterpart.


doi: 10.21437/Interspeech.2013-293

Cite as: Wu, Z., Larcher, A., Lee, K.A., Chng, E.S., Kinnunen, T., Li, H. (2013) Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints. Proc. Interspeech 2013, 950-954, doi: 10.21437/Interspeech.2013-293

@inproceedings{wu13_interspeech,
  author={Zhizheng Wu and Anthony Larcher and Kong Aik Lee and Eng Siong Chng and Tomi Kinnunen and Haizhou Li},
  title={{Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints}},
  year=2013,
  booktitle={Proc. Interspeech 2013},
  pages={950--954},
  doi={10.21437/Interspeech.2013-293}
}