Abstract | ||
---|---|---|
The potential for biometric systems to be manipulated through some form of subversion is well acknowledged. One such approach known as spoofing relates to the provocation of false accepts in authentication applications. Another approach referred to as obfuscation relates to the provocation of missed detections in surveillance applications. While the automatic speaker verification research community is now addressing spoofing and countermeasures, vulnerabilities to obfuscation remain largely unknown. This paper reports the first study. Our work with standard NIST datasets and protocols shows that the equal error rate of a standard GMM-UBM system is increased from 9% to 48% through obfuscation, whereas that of a state-of-the-art i-vector system increases from 3% to 20%. We also present a generalised approach to obfuscation detection which succeeds in detecting almost all attempts to evade detection. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/ICASSP.2014.6853696 | Acoustics, Speech and Signal Processing |
Keywords | Field | DocType |
biometrics (access control),cryptographic protocols,speaker recognition,surveillance,GMM-UBM system,NIST datasets,authentication applications,automatic speaker verification,biometric systems,i-vector system,obfuscation,protocols,spoofing,surveillance,biometrics,evasion,obfuscation,speaker recognition,speaker verification,spoofing,surveillance | Speaker verification,Authentication,Spoofing attack,Computer science,Computer security,Word error rate,Speaker recognition,NIST,Biometrics,Obfuscation | Conference |
ISSN | Citations | PageRank |
1520-6149 | 3 | 0.38 |
References | Authors | |
17 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Federico Alegre | 1 | 93 | 4.74 |
Giovanni Soldi | 2 | 11 | 2.90 |
nicholas evans | 3 | 594 | 54.41 |