V2S attack: building DNN-based voice conversion from automatic speaker verification

08/05/2019
by   Taiki Nakamura, et al.
0

This paper presents a new voice impersonation attack using voice conversion (VC). Enrolling personal voices for automatic speaker verification (ASV) offers natural and flexible biometric authentication systems. Basically, the ASV systems do not include the users' voice data. However, if the ASV system is unexpectedly exposed and hacked by a malicious attacker, there is a risk that the attacker will use VC techniques to reproduce the enrolled user's voices. We name this the “verification-to-synthesis (V2S) attack” and propose VC training with the ASV and pre-trained automatic speech recognition (ASR) models and without the targeted speaker's voice data. The VC model reproduces the targeted speaker's individuality by deceiving the ASV model and restores phonetic property of an input voice by matching phonetic posteriorgrams predicted by the ASR model. The experimental evaluation compares converted voices between the proposed method that does not use the targeted speaker's voice data and the standard VC that uses the data. The experimental results demonstrate that the proposed method performs comparably to the existing VC methods that trained using a very small amount of parallel voice data.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/29/2022

A single speaker is almost all you need for automatic speech recognition

We explore the use of speech synthesis and voice conversion applied to a...
research
10/27/2022

V-Cloak: Intelligibility-, Naturalness- Timbre-Preserving Real-Time Voice Anonymization

Voice data generated on instant messaging or social media applications c...
research
04/25/2020

Active Voice Authentication

Active authentication refers to a new mode of identity verification in w...
research
09/09/2022

Defend Data Poisoning Attacks on Voice Authentication

With the advances in deep learning, speaker verification has achieved ve...
research
04/24/2022

Dictionary Attacks on Speaker Verification

In this paper, we propose dictionary attacks against speaker verificatio...
research
10/30/2022

Symmetric Saliency-based Adversarial Attack To Speaker Identification

Adversarial attack approaches to speaker identification either need high...
research
09/04/2023

AVATAR: Robust Voice Search Engine Leveraging Autoregressive Document Retrieval and Contrastive Learning

Voice, as input, has progressively become popular on mobiles and seems t...

Please sign up or login with your details

Forgot password? Click here to reset