Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection - Archive ouverte HAL Access content directly
Conference Papers Year :

Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection

(1) , (1) , (1) , (2)
1
2

Abstract

We consider technology-assisted mimicry attacks in the context of automatic speaker verification (ASV). We use ASV itself to select targeted speakers to be attacked by human-based mimicry. We recorded 6 naive mimics for whom we select target celebrities from VoxCeleb1 and VoxCeleb2 corpora (7,365 potential targets) using an i-vector system. The attacker attempts to mimic the selected target, with the utterances subjected to ASV tests using an independently developed x-vector system. Our main finding is negative: even if some of the attacker scores against the target speakers were slightly increased, our mimics did not succeed in spoofing the x-vector system. Interestingly, however, the relative ordering of the selected targets (closest, furthest, median) are consistent between the systems, which suggests some level of transferability between the systems.
Fichier principal
Vignette du fichier
ICASSP19_Manuscript_UEF_Inria.pdf (390.92 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-02051701 , version 1 (28-02-2019)

Identifiers

  • HAL Id : hal-02051701 , version 1

Cite

Tomi Kinnunen, Rosa González Hautamäki, Ville Vestman, Md Sahidullah. Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection. ICASSP 2019 – 44th International Conference on Acoustics, Speech, and Signal Processing, May 2019, Brighton, United Kingdom. ⟨hal-02051701⟩
85 View
113 Download

Share

Gmail Facebook Twitter LinkedIn More