Skip to main content

The GMM and I-Vector Systems Based on Spoofing Algorithms for Speaker Spoofing Detection

  • Conference paper
  • First Online:
Biometric Recognition (CCBR 2019)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 11818))

Included in the following conference series:

Abstract

Automatic Speaker Verification (ASV) systems are more vulnerable to being attacked than other biometric systems, such as speech synthesis, voice conversion, and replay. In this paper, two frameworks (Gaussian mixture model based and i-vector based) are used to detect a variety of specific attack types. Three scoring methods (probabilistic normalization, linear regression and support vector machine) are used for the Gaussian Mixture Model (GMM) model. And three different classifiers (cosine distance, probabilistic linear discriminant analysis, support vector machine) are used for the i-vector system. Furthermore, the cosine classifier based on the i-vector system which uses three scoring methods is proposed in this paper. Experiments on the ASVspoof 2019 challenge logical access scenario show that the GMM classifier with the Support Vector Machines (SVM) scoring method based on different spoofing algorithms obtains the best performance on the evaluation set with EER of 7.03%. Moreover, SVM scoring is also useful for improving the i-vector system based on different spoofing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://datashare.is.ed.ac.uk/handle/10283/3336.

  2. 2.

    https://www.csie.ntu.edu.tw/~cjlin/libsvm/.

References

  1. ZhiZheng, W., Evans, N., Kinnunen, T., Yamagishi, J., Alegre, F., Li, H.: Spoofing and countermeasures for speaker verification: a survey. Speech Commun. 66, 130–153 (2015)

    Article  Google Scholar 

  2. Hautamäki, R.S., et al.: Automatic versus human speaker verification: the case of voice mimicry. Speech Commun. 72, 13–31 (2015)

    Article  Google Scholar 

  3. Zhizheng, W., Leon, P.L., Demiroglu, D., Khodabakhsh, A., et al.: Anti-spoofing for text-independent speaker verification: an initial database comparison of countermeasures and human performance. IEEE/ACM Trans. Audio Speech Lang. Process. 20(8), 768–783 (2016)

    Google Scholar 

  4. Zhizheng, W., Yamagishi, J., Kinnunen, T., Sahidullah, Md, et al.: ASVspoof: the automatic speaker verification spoofing and countermeasures challenge. IEEE J. Sel. Top. Sign. Process. 11(4), 588–604 (2017)

    Article  Google Scholar 

  5. Yamagishi, J., Kinnunen, T., Evans, N., De Leon, P.L.: Introduction to the issues on spoofing and countermeasures for automatic speaker verification. IEEE J. Sel. Top. Sign. Process. 11(4), 585–587 (2017)

    Article  Google Scholar 

  6. Xiaohai, T., SiuWa, L., Zhizheng, W., Eng Siong, C., Haizhou, L.: An example-based approach to frequency warping for voice conversation. IEEE/ACM Trans. Audio Speech Lang. Process. 25(10), 1863–1876 (2017)

    Article  Google Scholar 

  7. Rohan Kuman, D., Haizhou, L.: Instantaneous phase and excitation source features for detection of replay attacks. In: Asia-Pacific Signal and Information Processing Association (APSIPA) Annual Summit and Conference (ASC) 2018, November 2018

    Google Scholar 

  8. ASVspoof 2019: Automatic speaker verification spoofing and countermeasures challenge evaluation plan. http://www.asvspoof.org/asvspoof2019/asvspoof2019evaluation/plan.pdf

  9. Kinnunen, T., Wu, Z.-Z., Lee, K.A., Sedlak, F., Chng, E.S., Li, H.: Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech. In: ICASSP (2012)

    Google Scholar 

  10. Lorenzo Trueba, J., et al.: The voice conversion challenge 2018: promoting development of parallel and nonparallel methods. In: The Speaker and Language Recognition Workshop, Odyssey, pp. 195–202 (2018)

    Google Scholar 

  11. Leon, P.L.D., Apsingekar, V.R., Pucher, M., Yamagishi, J.: Revisiting the security of speaker verification systems against imposture using synthetic speech. In: Proceedings ICASSP, pp. 1798–1801 (2010)

    Google Scholar 

  12. Farrús, M.: Voice disguise in automatic speaker recognition. ACM Comput. Surv. 51(4), 681–6822 (2018)

    Article  Google Scholar 

  13. Alegre, F., Vipperla, R., Evans, N.W.D., Fauve, B.G.B.: On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals. In: Proceedings EUSIPCO, pp. 36–40 (2012)

    Google Scholar 

  14. Sahidullah, M., Kinnunen, T., Hanilci, C.: A comparison of features for synthetic speech detection. In: Proceedings INTERSPEECH, pp. 2087–2091 (2015)

    Google Scholar 

  15. Gomez-Alanis, A., et al.: Performance evaluation of front-and back-end techniques for ASV spoofing detection systems based on deep features. In: Proceedings IberSPEECH 2018, pp. 45–49 (2018)

    Google Scholar 

  16. Alam, M.J., Kenny, P., Bhattacharya, G., Stafylakis, T.: Development of crim system for the automatic speaker verification spoofing and countermeasures challenge 2015. In: Proceedings INTERSPEECH, pp. 2072–2076 (2015)

    Google Scholar 

  17. Kannangola, D., et al.: Factor analysis methods for joint speaker verification and spoof detection. In: Proceedings ICASSP, pp. 5385–5389 (2017)

    Google Scholar 

  18. Todisco, M., Delgado, H., Evans, N.: A new feature for automatic speaker verification anti-spoofing: constant Q cepstral coefficients. In: Proceedings Odyssey (2016)

    Google Scholar 

  19. Novoselov, S., Kozlov, A., Lavrentyeva, G., Simonchik, K., Shchemelinin, V.: STC anti-spoofing systems for the ASVspoof 2015 challenge. In: Proceedings IEEE International Conference Acoustics, Speech and Signal Processing (ICASSP), pp. 5475–5479 (2016)

    Google Scholar 

  20. Weng, S., et al.: The SYSU system for the interspeech 2015 automatic speaker verification spoofing and countermeasures challenge. In: Proceedings APSIPA, pp. 152–155 (2015)

    Google Scholar 

  21. Reynolds, D.A., Quatieri, T.F., Dunn, R.B.: Speaker verification using adapted Gaussian mixture models. Digit. Signal Process. 10(1–3), 19–41 (2000)

    Article  Google Scholar 

  22. Wang, L., Yoshida, Y., Kawakami, Y., Nakagawa, S.: Relative phase information for detecting human speech and spoofed speech. In: Proceedings INTERSPEECH, pp. 2092–2096 (2015)

    Google Scholar 

  23. Nanxin, C., et al.: Robust deep feature for spoofing detection—The SJTU system for ASVspoof 2015 challenge. In: Sixteenth Annual Conference of the International Speech Communication Association (2015)

    Google Scholar 

  24. Dehak, N., Kenny, P., Dehak, R., Dumouchel, P., Ouellet, P.: Front-end factor analysis for speaker verification. IEEE Trans. Audio Speech Lang. Process. 19(4), 788–798 (2011)

    Article  Google Scholar 

  25. Kinnunen, T., et al.: t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification. In: Proceedings Odyssey, Les Sables d’Olonne, France, June 2018

    Google Scholar 

  26. Hatch, A.O., Kajarekar, S.S., Stolcke, A.: Within-class covariance normalization for SVM-based speaker recognition. In: Proceedings ICSLP (2006)

    Google Scholar 

  27. Garcia-Romero, D., Espy-Wilson, C.Y.: Analysis of i-vector length normalization in speaker recognition systems. In: Proceedings INTERSPEECH, pp. 249–252 (2011)

    Google Scholar 

Download references

Acknowledgements

This work is supported by National Natural Science Foundation of P.R. China (61365004, 61662030), and by Educational Commission of Jiangxi Province of P.R. China (GJJ170205).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenchun Lei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tang, H., Lei, Z., Huang, Z., Gan, H., Yu, K., Yang, Y. (2019). The GMM and I-Vector Systems Based on Spoofing Algorithms for Speaker Spoofing Detection. In: Sun, Z., He, R., Feng, J., Shan, S., Guo, Z. (eds) Biometric Recognition. CCBR 2019. Lecture Notes in Computer Science(), vol 11818. Springer, Cham. https://doi.org/10.1007/978-3-030-31456-9_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-31456-9_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-31455-2

  • Online ISBN: 978-3-030-31456-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics