Skip to main content

Anti-spoofing, Voice Conversion

  • Reference work entry
  • First Online:
Encyclopedia of Biometrics

Synonyms

Presentation attack; Speaker recognition; Speaker verification; Voice transformation

Definition

Voice conversion is a process which converts or transforms one speaker’s voice towards that of another. The literature shows that voice conversion can be used to spoof or fool an automatic speaker verification system. State-of-the-art voice conversion algorithms can produce high-quality speech signals in real time and are capable of fooling both human listeners and automatic systems, including text-independent and text-dependent. Furthermore, since converted voice originates from a living person, traditional liveness detection countermeasures are not necessarily effective in detecting such attacks. With today’s state-of-the-art algorithms producing high-quality speech with only few indicative processing artifacts, the detection of converted voice can be especially challenging.

Introduction

Whereas the threat of spoofing to some biometric modalities has received considerable...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. N. Evans, T. Kinnunen, J. Yamagishi, Spoofing and countermeasures for automatic speaker verification, in Proceedings of INTERSPEECH, Lyon, 2013

    Google Scholar 

  2. N. Evans, T. Kinnunen, J. Yamagishi, Z. Wu, F. Alegre, P. De Leon, Anti-spoofing for speaker recognition, in Handbook of Biometric Anti-spoofing, ed. by S. Marcel, S.Z. Li, M. Nixon (Springer, 2014) Springer-Verlag London

    Google Scholar 

  3. Z. Wu, H. Li, Voice conversion and spoofing attack on speaker verification systems, in Proceedings of Asia-Pacific Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), Kaohsiung, 2013

    Google Scholar 

  4. M. Abe, S. Nakamura, K. Shikano, H. Kuwabara, Voice conversion through vector quantization, in Proceedings of the 1988 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), New York, vol. 1, 1988, pp. 655–658

    Google Scholar 

  5. Y. Stylianou, O. Cappé, E. Moulines, Continuous probabilistic transform for voice conversion. IEEE Trans. Speech Audio Process. 6(2), 131–142 (1998)

    Google Scholar 

  6. B.L. Pellom, J.H.L. Hansen, An experimental study of speaker verification sensitivity to computer voice-altered imposters, in Proceedings of the 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Phoenix, vol. 2, 1999, pp. 837–840

    Google Scholar 

  7. A. Kain, M.W. Macon, Spectral voice conversion for text-to-speech synthesis, in Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seattle, 1998, pp. 285–288

    Google Scholar 

  8. Z. Wu, A. Larcher, K.A. Lee, E.S. Chng, T. Kinnunen, H. Li, Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints, in Proceedings of INTERSPEECH, Lyon, 2013

    Google Scholar 

  9. D. Matrouf, J.-F. Bonastre, C. Fredouille, Effect of speech transformation on impostor acceptance, in Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toulouse, 2006

    Google Scholar 

  10. F. Alegre, R. Vipperla, N. Evans, Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals, in Proceedings of INTERSPSEECH, Portland, 2012

    Google Scholar 

  11. Z. Wu, T. Kinnunen, E.-S. Chng, H. Li, E. Ambikairajah, A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case, in Proceedings of Asia-Pacific Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), Hollywood, 2012

    Google Scholar 

  12. Z. Wu, E.S. Chng, H. Li, Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition, in Proceedings of INTERSPEECH, Portland, 2012

    Google Scholar 

  13. F. Alegre, A. Amehraye, N. Evans, Spoofing countermeasures to protect automatic speaker verification from voice conversion, in Proceedings of the 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, 2013

    Google Scholar 

  14. F. Alegre, R. Vipperla, A. Amehraye, N. Evans, A new speaker verification spoofing countermeasure based on local binary patterns, in Proceedings of INTERSPEECH, Lyon, 2013

    Google Scholar 

  15. F. Alegre, A. Amehraye, N. Evans, A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns, in Proceedings of the International Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington, DC, 2013

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Evans, N., Alegre, F., Wu, Z., Kinnunen, T. (2015). Anti-spoofing, Voice Conversion. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_9111

Download citation

Publish with us

Policies and ethics