Performing a Presentation Attack Detection on Voice Biometrics

With the growing number of voice biometrics applications (e.g. banking), it has become necessary to be able to assess and compare different systems' detection of Presentation Attacks, as attackers could have access to sensitive data. For this end, a common ground is needed to perform comparable security evaluations. Based on our experience performing evaluations, this paper unifies several methodologies such as Common Criteria, ISO/IEC JTC1 30107-3 and others to evaluate the security of voice biometric systems.

[1]  M. Wagner,et al.  Vulnerability of speaker verification to voice mimicking , 2004, Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004..

[2]  Zhizheng Wu,et al.  Voice conversion and spoofing attack on speaker verification systems , 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.

[3]  中尾 康二 ISO/IEC JTC 1/SC27 : セキュリティ技術 (画像電子年報) -- (標準化動向) , 2002 .

[4]  Judith Liu-Jimenez,et al.  Best practices for the security evaluation of biometric systems , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).