A New Replay Attack Against Automatic Speaker Verification Systems
With the increasing popularity of automatic speaker verification (ASV), the reliability of ASV systems has also gained importance. ASV is vulnerable to various spoofing attacks, especially replay attacks. Thus, recent public competitions and studies based on spoofing attack detection for ASV have ma...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9000558/ |
id |
doaj-27087504f87e4d55a20d2090ba2ee14d |
---|---|
record_format |
Article |
spelling |
doaj-27087504f87e4d55a20d2090ba2ee14d2021-03-30T02:30:55ZengIEEEIEEE Access2169-35362020-01-018360803608810.1109/ACCESS.2020.29742909000558A New Replay Attack Against Automatic Speaker Verification SystemsSung-Hyun Yoon0https://orcid.org/0000-0001-7915-7198Min-Sung Koh1Jae-Han Park2Ha-Jin Yu3https://orcid.org/0000-0003-3657-0665School of Computer Science, University of Seoul, Seoul, South KoreaSchool of Computing and Engineering Sciences, Eastern Washington University, Cheney, WA, USAService Laboratory, Institute of Convergence Technology, KT R&D Center, Seoul, South KoreaSchool of Computer Science, University of Seoul, Seoul, South KoreaWith the increasing popularity of automatic speaker verification (ASV), the reliability of ASV systems has also gained importance. ASV is vulnerable to various spoofing attacks, especially replay attacks. Thus, recent public competitions and studies based on spoofing attack detection for ASV have mainly focused on the detection of replay attacks. Generally, replayed speech includes the attributes of one playback and two recording devices: the playback device, the recording device used by the attacker, and the recording device embedded in any system to verify input utterances. Therefore, the main attributes differentiating a replayed speech from the genuine speech are the attributes of the playback and the recording devices used by the attacker. In this paper, we propose a novel replay attack and its defense through observation of the general speech-spoofing process. The proposed attack includes only the attribute of one recording device embedded in an ASV system; genuine speech passes through the recording device only once, and the replayed speech produced for the proposed attack passes through the same recording device twice. Because the proposed attack is feasible, it can be considered a new task for replay countermeasures in the training process in order to develop a robust ASV protection system. The experimental results show that this novel replay attack cannot be detected by several of the existing state-of-the-art replay attack detection systems. Furthermore, the new attack can be detected by the same systems successfully if they are retrained with an appropriate dataset designed for the new task.https://ieeexplore.ieee.org/document/9000558/Automatic speaker verificationreplay attacksame recording devicespoofing detection |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sung-Hyun Yoon Min-Sung Koh Jae-Han Park Ha-Jin Yu |
spellingShingle |
Sung-Hyun Yoon Min-Sung Koh Jae-Han Park Ha-Jin Yu A New Replay Attack Against Automatic Speaker Verification Systems IEEE Access Automatic speaker verification replay attack same recording device spoofing detection |
author_facet |
Sung-Hyun Yoon Min-Sung Koh Jae-Han Park Ha-Jin Yu |
author_sort |
Sung-Hyun Yoon |
title |
A New Replay Attack Against Automatic Speaker Verification Systems |
title_short |
A New Replay Attack Against Automatic Speaker Verification Systems |
title_full |
A New Replay Attack Against Automatic Speaker Verification Systems |
title_fullStr |
A New Replay Attack Against Automatic Speaker Verification Systems |
title_full_unstemmed |
A New Replay Attack Against Automatic Speaker Verification Systems |
title_sort |
new replay attack against automatic speaker verification systems |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
With the increasing popularity of automatic speaker verification (ASV), the reliability of ASV systems has also gained importance. ASV is vulnerable to various spoofing attacks, especially replay attacks. Thus, recent public competitions and studies based on spoofing attack detection for ASV have mainly focused on the detection of replay attacks. Generally, replayed speech includes the attributes of one playback and two recording devices: the playback device, the recording device used by the attacker, and the recording device embedded in any system to verify input utterances. Therefore, the main attributes differentiating a replayed speech from the genuine speech are the attributes of the playback and the recording devices used by the attacker. In this paper, we propose a novel replay attack and its defense through observation of the general speech-spoofing process. The proposed attack includes only the attribute of one recording device embedded in an ASV system; genuine speech passes through the recording device only once, and the replayed speech produced for the proposed attack passes through the same recording device twice. Because the proposed attack is feasible, it can be considered a new task for replay countermeasures in the training process in order to develop a robust ASV protection system. The experimental results show that this novel replay attack cannot be detected by several of the existing state-of-the-art replay attack detection systems. Furthermore, the new attack can be detected by the same systems successfully if they are retrained with an appropriate dataset designed for the new task. |
topic |
Automatic speaker verification replay attack same recording device spoofing detection |
url |
https://ieeexplore.ieee.org/document/9000558/ |
work_keys_str_mv |
AT sunghyunyoon anewreplayattackagainstautomaticspeakerverificationsystems AT minsungkoh anewreplayattackagainstautomaticspeakerverificationsystems AT jaehanpark anewreplayattackagainstautomaticspeakerverificationsystems AT hajinyu anewreplayattackagainstautomaticspeakerverificationsystems AT sunghyunyoon newreplayattackagainstautomaticspeakerverificationsystems AT minsungkoh newreplayattackagainstautomaticspeakerverificationsystems AT jaehanpark newreplayattackagainstautomaticspeakerverificationsystems AT hajinyu newreplayattackagainstautomaticspeakerverificationsystems |
_version_ |
1724185046301016064 |