Encyclopedia of Biometrics

Living Edition
| Editors: Stan Z. Li, Anil K. Jain

Anti-spoofing: Voice Conversion

  • Nicholas Evans
  • Federico Alegre
  • Zhizheng Wu
  • Tomi Kinnunen
Living reference work entry
DOI: https://doi.org/10.1007/978-3-642-27733-7_9111-2

Synonyms

Definition

Voice conversion is a process which converts or transforms one speaker’s voice towards that of another. The literature shows that voice conversion can be used to spoof or fool an automatic speaker verification system. State-of-the-art voice conversion algorithms can produce high-quality speech signals in real time and are capable of fooling both human listeners and automatic systems, including text-independent and text-dependent. Furthermore, since converted voice originates from a living person, traditional liveness detection countermeasures are not necessarily effective in detecting such attacks. With today’s state-of-the-art algorithms producing high-quality speech with only few indicative processing artifacts, the detection of converted voice can be especially challenging.

Introduction

Whereas the threat of spoofing to some biometric modalities has received considerable...

This is a preview of subscription content, log in to check access.

References

  1. 1.
    N. Evans, T. Kinnunen, J. Yamagishi, Spoofing and countermeasures for automatic speaker verification, in Proceedings of INTERSPEECH, Lyon, 2013Google Scholar
  2. 2.
    N. Evans, T. Kinnunen, J. Yamagishi, Z. Wu, F. Alegre, P. De Leon, Anti-spoofing for speaker recognition, in Handbook of Biometric Anti-spoofing, ed. by S. Marcel, S.Z. Li, M. Nixon (Springer, 2014) Springer-Verlag LondonGoogle Scholar
  3. 3.
    Z. Wu, H. Li, Voice conversion and spoofing attack on speaker verification systems, in Proceedings of Asia-Pacific Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), Kaohsiung, 2013Google Scholar
  4. 4.
    M. Abe, S. Nakamura, K. Shikano, H. Kuwabara, Voice conversion through vector quantization, in Proceedings of the 1988 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), New York, vol. 1, 1988, pp. 655–658Google Scholar
  5. 5.
    Y. Stylianou, O. Cappé, E. Moulines, Continuous probabilistic transform for voice conversion. IEEE Trans. Speech Audio Process. 6(2), 131–142 (1998)CrossRefGoogle Scholar
  6. 6.
    B.L. Pellom, J.H.L. Hansen, An experimental study of speaker verification sensitivity to computer voice-altered imposters, in Proceedings of the 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Phoenix, vol. 2, 1999, pp. 837–840Google Scholar
  7. 7.
    A. Kain, M.W. Macon, Spectral voice conversion for text-to-speech synthesis, in Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seattle, 1998, pp. 285–288Google Scholar
  8. 8.
    Z. Wu, A. Larcher, K.A. Lee, E.S. Chng, T. Kinnunen, H. Li, Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints, in Proceedings of INTERSPEECH, Lyon, 2013Google Scholar
  9. 9.
    D. Matrouf, J.-F. Bonastre, C. Fredouille, Effect of speech transformation on impostor acceptance, in Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toulouse, 2006Google Scholar
  10. 10.
    F. Alegre, R. Vipperla, N. Evans, Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals, in Proceedings of INTERSPSEECH, Portland, 2012Google Scholar
  11. 11.
    Z. Wu, T. Kinnunen, E.-S. Chng, H. Li, E. Ambikairajah, A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case, in Proceedings of Asia-Pacific Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), Hollywood, 2012Google Scholar
  12. 12.
    Z. Wu, E.S. Chng, H. Li, Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition, in Proceedings of INTERSPEECH, Portland, 2012Google Scholar
  13. 13.
    F. Alegre, A. Amehraye, N. Evans, Spoofing countermeasures to protect automatic speaker verification from voice conversion, in Proceedings of the 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, 2013Google Scholar
  14. 14.
    F. Alegre, R. Vipperla, A. Amehraye, N. Evans, A new speaker verification spoofing countermeasure based on local binary patterns, in Proceedings of INTERSPEECH, Lyon, 2013Google Scholar
  15. 15.
    F. Alegre, A. Amehraye, N. Evans, A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns, in Proceedings of the International Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington, DC, 2013Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Nicholas Evans
    • 1
  • Federico Alegre
    • 1
  • Zhizheng Wu
    • 2
  • Tomi Kinnunen
    • 3
  1. 1.EURECOMBiotFrance
  2. 2.Nanyang Technological University (NTU)NanyangSingapore
  3. 3.University of Eastern Finland (UEF)JoensuuFinland