Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 531-536.doi: 10.11896/jsjkx.210500147

• Information Security • Previous Articles     Next Articles

Robust Speaker Verification with Spoofing Attack Detection

GUO Xing-chen, YU Yi-biao   

  1. Department of Electronics and Information,Soochow University,Suzhou,Jiangsu 215000,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:GUO Xing-chen,born in 1994,postgra-duate.Her main research interests include speaker identification and counterfeit attack detection.
    YU Yi-biao,born in 1962,professor.His main research interests include voice signal processing,multimedia communication and information hiding.

Abstract: Spoofing attacks seriously affect the security application of speaker verification system.This paper proposes a speaker verification system with replay attack detection capability,which has a series connection structure of front-end attack detection and back-end speaker verification.In addition,this paper proposes a channel frequency response difference enhancement cepstral coefficient(CDECC) through channel frequency response analysis and speaker personality analysis.The CDECC enhances the low and high frequency bands of the speech signal spectrum by the third-order polynomial nonlinear frequency transform,which can effectively reflect the channel frequency response difference of different input channels and the speech spectrum difference of different speakers.The speaker and text independent replay attack detection experiment based on ASVspoof 2017 2.0 dataset shows that the equal error rate(EER) of CDECC based replay attack detection is 25.03%,which is 10.00% lower than the baseline system.By embedding the replay attack detection module at the front end of the speaker verification,the speaker verification system's false acceptance rate(FAR) is significantly reduced,the system's EER is reduced from 3.32% to 1.01%,and the robustness is effectively improved.

Key words: CDECC, Replay attack detection, Speaker recognition, Speaker verification

CLC Number: 

  • TP370
[1] NAIR R,SALAM N.A reliable speaker verification systembased on LPCC and DTW[C]//2014 IEEE International Conference on Computational Intelligence and Computing Research.IEEE,2014:1-4.
[2] BALASINGAM M D,KUMAR C S.Refining Cosine Distance Features for Robust Speaker Verification[C]//2018 International Conference on Communication and Signal Processing(ICCSP).IEEE,2018:0152-0155.
[3] YAMAGISHI J,KINNUNEN T H,EVANS N,et al.Introduction to the Issue on Spoofing and Countermeasures for Automa-tic Speaker Verification[J].IEEE Journal of Selected Topics in Signal Processing,2017,11(4):585-587.
[4] TIAN X,LEE S W,WU Z,et al.An exemplar-based approach to frequency warping for voice conversion[J].IEEE/ACM Tran-sactions on Audio,Speech,and Language Processing,2017,25(10):1863-1876.
[5] LI S L,WANG Y,GAN J Y.Recorded speech detection algo-rithm[J].Signal Processing,2017,33(1):95-101.
[6] KAMBLE M R,PATIL H A.Novel energy separation based instantaneous frequency features for spoof speech detection[C]//2017 25th European Signal Processing Conference(EUSIPCO).IEEE,2017:106-110.
[7] PATIL H A,KAMBLE M R,PATEL T B,et al.Novel Variable Length Teager Energy Separation Based Instantaneous Frequency Features for Replay Detection[C]//INTERSPEECH.2017:12-16.
[8] JELIL S,DAS R K,PRASANNA S R M,et al.Spoof Detection Using Source,Instantaneous Frequency and Cepstral Features[C]//Interspeech.2017:22-26.
[9] JI Z,LI Z Y,LI P,et al.Ensemble Learning for Countermeasure of Audio Replay Spoofing Attack in ASVspoof2017[C]//INTERSPEECH.2017:87-91.
[10] NAGARSHETH P,KHOURY E,PATIL K,et al.Replay Attack Detection Using DNN for Channel Discrimination[C]//Interspeech.2017:97-101.
[11] ALLURI K R,ACHANTA S,KADIRI S R,et al.SFF Anti-Spoofer:IIIT-H Submission for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017[C]//Interspeech.2017:107-111.
[12] WANG X,XIAO Y,ZHU X.Feature Selection Based on CQCCs for Automatic Speaker Verification Spoofing[C]//INTERSPEECH.2017:32-36.
[13] PENG H,LONG F,DING C.Feature selection based on mutual information:criteria of max-dependency,max-relevance,and min-redundancy[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2005(8):1226-1238.
[14] WITKOWSKI M,KACPRZAK S,ZELASKO P,et al.AudioReplay Attack Detection Using High-Frequency Features[C]//INTERSPEECH.2017:27-31.
[15] KAMBLE M R,PATIL H A.Analysis of Reverberation viaTeager Energy Features for Replay Spoof Speech Detection[C]//2019 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP 2019).IEEE,2019.
[16] KAMBLE M R,PATIL H A.Detection of Replay Spoof Speech Using Teager Energy Feature Cues[J].Computer Speech & Language,2020,65:101140.
[17] TODISCO M,DELGADO H,EVANS N.Constant Q cepstralcoefficients:A spoofing countermeasure for automatic speaker verification[J].Computer Speech & Language,2017,45:516-535.
[1] ZHENG Chun-jun, WANG Chun-li, JIA Ning. Survey of Acoustic Feature Extraction in Speech Tasks [J]. Computer Science, 2020, 47(5): 110-119.
[2] HUA Ming, LI Dong-dong, WANG Zhe, GAO Da-qi. End-to-End Speaker Recognition Based on Frame-level Features [J]. Computer Science, 2020, 47(10): 169-173.
[3] LUO Yuan and SUN Long. New Method of Robust Voiceprint Feature Extraction and Fusion [J]. Computer Science, 2016, 43(8): 297-299.
[4] . TEo-CrCC Characteristic Parameter Extraction Method for Speaker Recognition in Noisy Environments [J]. Computer Science, 2012, 39(12): 198-203.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!