Attack Methods in Speaker Verification System:The State of the Art and Prospects
CSTR:
Author:
Affiliation:

College of Command and Control Engineering, Army Engineering University of PLA, Nanjing 210007, China

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    The development of automatic speaker verification (ASV) technology is profoundly affecting and changing the current human-computer interaction system. As the core speech function of some smart devices, ASV can accept the voice of the target speakers and accurately identify the speakers’ identities. In recent years, the rapid development of artificial intelligence technology has promoted the leapfrog development of ASV systems. However, with the development of artificial neural network and deep learning technology, more and more researchers begin to study the way to attack ASV systems. How to attack ASV systems through a series of processing of raw speech has been a hot topic in speech research in recent years. At present, the attack methods of ASV systems can be roughly divided into spoofing attacks and adversarial attacks. In this paper, the typical methods and basic principles of the two kinds of attacks are summarized, some problems existing in current attack methods are sorted out, the safety problems existing in the system of ASV are revealed, a brief outlook on the future development of ASV system security is given, and the development directions of improving the security and reliability of ASV systems are provided.

    Reference
    Related
    Cited by
Get Citation

ZHANG Xiongwei, ZHANG Xingyu, SUN Meng, ZOU Xia. Attack Methods in Speaker Verification System:The State of the Art and Prospects[J].,2021,36(5):831-849.

Copy
Related Videos

Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:April 01,2021
  • Revised:July 07,2021
  • Adopted:
  • Online: September 25,2021
  • Published:
Article QR Code