The speech synthesis detection algorithm based on cepstral coefficients and convolutional neural network
Annotation
The existing approaches to detecting synthesized speech, based on the current issues of synthesizing voice sequences, are considered. The stages of the algorithm for detecting spoofing attacks on voice biometric systems are described, and its final workflow is presented. The research focuses mainly on detecting synthesized speech, as it is the most dangerous type of attacks. The authors designed a software application for an experimental study, present its structure and propose the detection synthesized speech algorithm. This algorithm uses mel-frequency and constant Q cepstral coefficients to extract speech features. A Gaussian mixture model is used to construct a user model. Convolutional neural network was chosen as a classifier to determine the voice’s authenticity. Two basic methods for combating spoofing attacks, proposed by the authors of the ASVspoof2019 competition, were selected for making comparisons. One of these methods involved using linear frequency cepstral coefficients as speech features, while the other method used constant Q. Both solutions used Gaussian mixture models for classification. To evaluate the effectiveness of the proposed solution and compare it with other methods, a voice database was created. The selected EER and minDCF metrics were applied. The experimental results demonstrated the advantages of the proposed algorithm in comparison with the other algorithms. An advantage of the proposed solution is that it uses extracted speech features that perform efficiently when it comes to user identification. This makes it possible to use the algorithm to optimize a voice biometric system that has embedded protection against spoofing attacks that is built on speech synthesis. In addition, it is possible to use the proposed method for voice identification with minimal modifications required. Voice biometric identification systems have excellent opportunities in the banking sector. Such systems allow banks to simplify and accelerate the process of financial transactions and provide their users with advanced banking functions remotely. The implementation of voice biometric systems is difficult by their vulnerability to spoofing attacks, particularly to those conducted by means of speech synthesis. The proposed solution can be integrated into voice biometric systems to improve their security.
Keywords
Постоянный URL
Articles in current issue
- On the feasibility of the monostatic scheme for constructing the land-based telescope at supervision of space objects
- DREM procedure application for piecewise constant parameters identification
- Features of the morphology of micro- and nanoporous copper and silver films synthesized by substitution reaction for photocatalytic application.
- Nature-inspired metaheuristic scheduling algorithms in cloud: a systematic review
- Evaluation of the applicability of asynchronous programming methods to the data consistency problem in a microservices environment
- A factor model for detection and recognition of human face contours and elements
- A study of the stability of information and telecommunication networks under conditions of stochastic percolation of nodes
- Context-free path querying with all-path semantics using matrices with sets of intermediate vertices.
- Decision support system for the proton therapy implementation
- Determination of dangerous driving behavior based on the use of information from wearable electronic devices
- An automata-based programming engine
- Bayesian losses for homoscedastic aleatoric uncertainty modeling in pollen image detection
- Risk assessment methodology for information systems, based on the user behavior and IT-security incidents analysis
- Identification of user accounts by image comparison: the pHash-based approach
- A study of human motion in computer vision systems based on a skeletal model
- Solution of super- and hypersonic gas dynamic problems with a model of high-temperature air
- Modeling security violation processes in machine learning systems
- Mathematical modeling of an optimal oncotherapy for malignant tumors.
- A numerical study of the expansion of a gas-particles mixture with axial symmetry.
- The study of the birefrigence modulator based on lithium niobate