Deep learning serves voice cloning: How vulnerable are automatic speaker verification systems to spoofing trials?
| dc.contributor.author | Partila, Pavol | |
| dc.contributor.author | Továrek, Jaromír | |
| dc.contributor.author | Ilk, Hakki Gokhan | |
| dc.contributor.author | Rozhon, Jan | |
| dc.contributor.author | Vozňák, Miroslav | |
| dc.date.accessioned | 2020-04-26T11:52:13Z | |
| dc.date.available | 2020-04-26T11:52:13Z | |
| dc.date.issued | 2020 | |
| dc.description.abstract | This article verifies the reliability of automatic speaker verification (ASV) systems on new synthesis methods based on deep neural networks. ASV systems are widely used and applied regarding secure and effective biometric authentication. On the other hand, the rapid deployment of ASV systems contributes to the increased attention of attackers with newer and more sophisticated spoofing methods. Until recently, speech synthesis of the reference speaker did not seriously compromise the latest ASV systems. This situation is changing with the deployment of deep neural networks into the synthesis process. Projects including WaveNet, Deep Voice, Voice Loop, and many others generate very natural and high-quality speech that may clone voice identity. We are slowly approaching an era where we will not be able to recognize a genuine voice from a synthesized one. Therefore, it is necessary to define the robustness of current ASV systems to new methods of voice cloning. In this article, well-known SVM and GMM as well as new CNN-based ASVs are applied and subjected to synthesized speech from Tacotron 2 with the WaveNet TTS system. The results of this work confirm our concerns regarding the reliability of ASV systems against synthesized speech. | cs |
| dc.description.firstpage | 100 | cs |
| dc.description.issue | 2 | cs |
| dc.description.lastpage | 105 | cs |
| dc.description.source | Web of Science | cs |
| dc.description.volume | 58 | cs |
| dc.identifier.citation | IEEE Communications Magazine. 2020, vol. 58, issue 2, p. 100-105. | cs |
| dc.identifier.doi | 10.1109/MCOM.001.1900396 | |
| dc.identifier.issn | 0163-6804 | |
| dc.identifier.issn | 1558-1896 | |
| dc.identifier.uri | http://hdl.handle.net/10084/139440 | |
| dc.identifier.wos | 000521968600018 | |
| dc.language.iso | en | cs |
| dc.publisher | IEEE | cs |
| dc.relation.ispartofseries | IEEE Communications Magazine | cs |
| dc.relation.uri | http://doi.org/10.1109/MCOM.001.1900396 | cs |
| dc.rights | Copyright © 2020, IEEE | cs |
| dc.title | Deep learning serves voice cloning: How vulnerable are automatic speaker verification systems to spoofing trials? | cs |
| dc.type | article | cs |
| dc.type.status | Peer-reviewed | cs |
Files
License bundle
1 - 1 out of 1 results
Loading...
- Name:
- license.txt
- Size:
- 718 B
- Format:
- Item-specific license agreed upon to submission
- Description:
Collections
Publikační činnost VŠB-TUO ve Web of Science / Publications of VŠB-TUO in Web of Science
Publikační činnost IT4Innovations / Publications of IT4Innovations (9600)
Publikační činnost Katedry telekomunikačních technologií / Publications of Department of Telecommunications (440)
Články z časopisů s impakt faktorem / Articles from Impact Factor Journals
Publikační činnost IT4Innovations / Publications of IT4Innovations (9600)
Publikační činnost Katedry telekomunikačních technologií / Publications of Department of Telecommunications (440)
Články z časopisů s impakt faktorem / Articles from Impact Factor Journals