Logo do repositório

Vulnerability issues in Automatic Speaker Verification (ASV) systems

dc.contributor.authorGupta, Priyanka
dc.contributor.authorPatil, Hemant A.
dc.contributor.authorGuido, Rodrigo Capobianco [UNESP]
dc.contributor.institutionDhirubhai Ambani Institute of Information and Communication Technology (DAIICT)
dc.contributor.institutionUniversidade Estadual Paulista (UNESP)
dc.contributor.institutionThe LNM Institute of Information Technology
dc.date.accessioned2025-04-29T18:48:15Z
dc.date.issued2024-12-01
dc.description.abstractClaimed identities of speakers can be verified by means of automatic speaker verification (ASV) systems, also known as voice biometric systems. Focusing on security and robustness against spoofing attacks on ASV systems, and observing that the investigation of attacker’s perspectives is capable of leading the way to prevent known and unknown threats to ASV systems, several countermeasures (CMs) have been proposed during ASVspoof 2015, 2017, 2019, and 2021 challenge campaigns that were organized during INTERSPEECH conferences. Furthermore, there is a recent initiative to organize the ASVSpoof 5 challenge with the objective of collecting the massive spoofing/deepfake attack data (i.e., phase 1), and the design of a spoofing-aware ASV system using a single classifier for both ASV and CM, to design integrated CM-ASV solutions (phase 2). To that effect, this paper presents a survey on a diversity of possible strategies and vulnerabilities explored to successfully attack an ASV system, such as target selection, unavailability of global countermeasures to reduce the attacker’s chance to explore the weaknesses, state-of-the-art adversarial attacks based on machine learning, and deepfake generation. This paper also covers the possibility of attacks, such as hardware attacks on ASV systems. Finally, we also discuss the several technological challenges from the attacker’s perspective, which can be exploited to come up with better defence mechanisms for the security of ASV systems.en
dc.description.affiliationSpeech Research Lab Dhirubhai Ambani Institute of Information and Communication Technology (DAIICT)
dc.description.affiliationInstituto de Biociências Letras e Ciências Exatas Unesp - Univ Estadual Paulista (São Paulo State University), Rua Cristóvão Colombo 2265, Jd Nazareth
dc.description.affiliationDepartment of Communication and Computer Engineering The LNM Institute of Information Technology
dc.description.affiliationUnespInstituto de Biociências Letras e Ciências Exatas Unesp - Univ Estadual Paulista (São Paulo State University), Rua Cristóvão Colombo 2265, Jd Nazareth
dc.description.sponsorshipFundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
dc.description.sponsorshipConselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
dc.description.sponsorshipIdFAPESP: 2021/12407-4
dc.description.sponsorshipIdCNPq: 303854/2022-7
dc.identifierhttp://dx.doi.org/10.1186/s13636-024-00328-8
dc.identifier.citationEurasip Journal on Audio, Speech, and Music Processing, v. 2024, n. 1, 2024.
dc.identifier.doi10.1186/s13636-024-00328-8
dc.identifier.issn1687-4722
dc.identifier.issn1687-4714
dc.identifier.scopus2-s2.0-85188315751
dc.identifier.urihttps://hdl.handle.net/11449/299949
dc.language.isoeng
dc.relation.ispartofEurasip Journal on Audio, Speech, and Music Processing
dc.sourceScopus
dc.subjectAdversarial attacks
dc.subjectAttacker’s perspective
dc.subjectAutomatic speaker verification
dc.subjectDeepfake
dc.subjectSpoofing attacks
dc.titleVulnerability issues in Automatic Speaker Verification (ASV) systemsen
dc.typeResenhapt
dspace.entity.typePublication
unesp.author.orcid0000-0002-0924-8024[3]
unesp.campusUniversidade Estadual Paulista (UNESP), Instituto de Biociências, Letras e Ciências Exatas, São José do Rio Pretopt

Arquivos