Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Attack on practical speaker verification system using universal adversarial perturbations (2105.09022v1)

Published 19 May 2021 in cs.SD, cs.AI, and eess.AS

Abstract: In authentication scenarios, applications of practical speaker verification systems usually require a person to read a dynamic authentication text. Previous studies played an audio adversarial example as a digital signal to perform physical attacks, which would be easily rejected by audio replay detection modules. This work shows that by playing our crafted adversarial perturbation as a separate source when the adversary is speaking, the practical speaker verification system will misjudge the adversary as a target speaker. A two-step algorithm is proposed to optimize the universal adversarial perturbation to be text-independent and has little effect on the authentication text recognition. We also estimated room impulse response (RIR) in the algorithm which allowed the perturbation to be effective after being played over the air. In the physical experiment, we achieved targeted attacks with success rate of 100%, while the word error rate (WER) on speech recognition was only increased by 3.55%. And recorded audios could pass replay detection for the live person speaking.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Weiyi Zhang (53 papers)
  2. Shuning Zhao (1 paper)
  3. Le Liu (25 papers)
  4. Jianmin Li (43 papers)
  5. Xingliang Cheng (1 paper)
  6. Thomas Fang Zheng (36 papers)
  7. Xiaolin Hu (97 papers)
Citations (42)

Summary

We haven't generated a summary for this paper yet.