An Investigation on Voice Mimicry Attacks to a Speaker Recognition System

Voice mimicry is the act in which imitators reproduce the vocal characteristics of another person. It can be considered to be an attack to a speaker recognition system. This work evaluates a speaker identification system under mimicry attacks: the goal is to point out how the accuracy of the system changes depending on the various real scenarios could occur. For this purpose, a GMM-UBM model and an I-Vector have been implemented and tested over dataset of Italian language imitations. Tests have been performed different audio lengths and different use cases. Use cases also take into consideration some possible countermeasures.

[1]  Ashraf A. M. Khalaf,et al.  Text-dependent and text-independent speaker recognition of reverberant speech based on CNN , 2021, International Journal of Speech Technology.

[2]  Khalid Isa,et al.  A review on speaker recognition: Technology and challenges , 2021, Comput. Electr. Eng..

[3]  Tomi Kinnunen,et al.  Voice Mimicry Attacks Assisted by Automatic Speaker Verification , 2019, Comput. Speech Lang..

[4]  Giuseppe Pirlo,et al.  Automatic Signature Verification in the Mobile Cloud Scenario: Survey and Way Ahead , 2018, IEEE Transactions on Emerging Topics in Computing.

[5]  Nasser M. Nasrabadi,et al.  Text-Independent Speaker Verification Using 3D Convolutional Neural Networks , 2017, 2018 IEEE International Conference on Multimedia and Expo (ICME).

[6]  Fang-Yie Leu,et al.  An MFCC-Based Speaker Identification System , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).

[7]  Khushboo S. Desai,et al.  Speaker recognition from the mimicked speech: A review , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[8]  Tomi Kinnunen,et al.  Automatic versus human speaker verification: The case of voice mimicry , 2015, Speech Commun..

[9]  Haizhou Li,et al.  Spoofing and countermeasures for speaker verification: A survey , 2015, Speech Commun..

[10]  M. Wagner,et al.  Vulnerability of speaker verification to voice mimicking , 2004, Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004..

[11]  Jungpil Shin,et al.  A Survey of Speaker Recognition: Fundamental Theories, Recognition Methods and Opportunities , 2021, IEEE Access.

[12]  2020 International Conference on Communication and Signal Processing (ICCSP) , 2020 .

[13]  Noor Salwani Ibrahim,et al.  I-vector Extraction for Speaker Recognition Based on Dimensionality Reduction , 2018, KES.

[14]  Tomi Kinnunen,et al.  I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry , 2013, INTERSPEECH.

[15]  Douglas A. Reynolds,et al.  Gaussian Mixture Models , 2018, Encyclopedia of Biometrics.