4.2 Article

Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference

Journal

SECURITY AND COMMUNICATION NETWORKS
Volume 2021, Issue -, Pages -

Publisher

WILEY-HINDAWI
DOI: 10.1155/2021/6664578

Keywords

-

Funding

  1. National Natural Science Foundation of China [61972348]
  2. National Key Research and Development Program of China [2018YFB0803600]
  3. Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang [2018R01005]

Ask authors/readers for more resources

This paper introduces an attack strategy against speaker verification systems based on deep neural networks, with a success rate of up to 82% and high imperceptibility, capable of deceiving the system while remaining hidden from human hearing or machine discrimination.
Speaker verification system has gained great popularity in recent years, especially with the development of deep neural networks and Internet of Things. However, the security of speaker verification system based on deep neural networks has not been well investigated. In this paper, we propose an attack to spoof the state-of-the-art speaker verification system based on generalized end-to-end (GE2E) loss function for misclassifying illegal users into the authentic user. Specifically, we design a novel loss function to deploy a generator for generating effective adversarial examples with slight perturbation and then spoof the system with these adversarial examples to achieve our goals. The success rate of our attack can reach 82% when cosine similarity is adopted to deploy the deep-learning-based speaker verification system. Beyond that, our experiments also reported the signal-to-noise ratio at 76 dB, which proves that our attack has higher imperceptibility than previous works. In summary, the results show that our attack not only can spoof the state-of-the-art neural-network-based speaker verification system but also more importantly has the ability to hide from human hearing or machine discrimination.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available