Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data
Files
Self archived version
published versionDate
2017Author(s)
Unique identifier
10.21437/Interspeech.2017-1758Metadata
Show full item recordMore information
Self-archived item
Citation
Sarkar, Archintya. Sahidullah, Md. Tan, Zheng-Hua. Kinnunen, Tomi. (2017). Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data. Proceedings of the 18th Annual Conference of the International Speech Communication Association, 2611-2615. 10.21437/Interspeech.2017-1758.Rights
Abstract
Automatic speaker verification (ASV) systems are vulnerable to spoofing attacks using speech generated by voice conversion and speech synthesis techniques. Commonly, a countermeasure (CM) system is integrated with an ASV system for improved protection against spoofing attacks. But integration of the two systems is challenging and often leads to increased false rejection rates. Furthermore, the performance of CM severely degrades if in-domain development data are unavailable. In this study, therefore, we propose a solution that uses two separate background models — one from human speech and another from spoofed data. During test, the ASV score for an input utterance is computed as the difference of the log-likelihood against the target model and the combination of the log-likelihoods against two background models. Evaluation experiments are conducted using the joint ASV and CM protocol of ASVspoof 2015 corpus consisting of text-independent ASV tasks with short utterances. Our proposed system reduces error rates in the presence of spoofing attacks by using out-of-domain spoofed data for system development, while maintaining the performance for zero-effort imposter attacks compared to the baseline system.