14thAnnual Conference of the International Speech Communication Association

Lyon, France
August 25-29, 2013

Vulnerability Evaluation of Speaker Verification Under Voice Conversion Spoofing: The Effect of Text Constraints

Zhizheng Wu (1), Anthony Larcher (2), Kong Aik Lee (2), Eng Siong Chng (1), Tomi Kinnunen (3), Haizhou Li (1)

(1) Nanyang Technological University, Singapore
(2) A*STAR, Singapore
(3) University of Eastern Finland, Finland

Voice conversion, a technique to change one's voice to sound like that of another, poses a threat to even high performance speaker verification system. Vulnerability of text-independent speaker verification systems under spoofing attack, using statistical voice conversion technique, was evaluated and confirmed in our previous work. In this paper, we further extend the study to text-dependent speaker verification systems. In particular, we compare both joint density Gaussian mixture model (JD-GMM) and unit-selection (US) spoofing methods and, for the first time, the performances of text-independent and text-dependent speaker verification systems in a single study. We conduct the experiments using RSR2015 database which is recorded using multiple mobile devices. The experimental results indicate that text-dependent speaker verification system tolerates spoofing attacks better than the text-independent counterpart.

Full Paper

Bibliographic reference.  Wu, Zhizheng / Larcher, Anthony / Lee, Kong Aik / Chng, Eng Siong / Kinnunen, Tomi / Li, Haizhou (2013): "Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints", In INTERSPEECH-2013, 950-954.