Loading...
Thumbnail Image
Item

Detecting replay attacks in audiovisual identity verification

Abstract
We describe an algorithm that detects a lack of correspondence between speech and lip motion by detecting and monitoring the degree of synchrony between live audio and visual signals. It is simple, effective, and computationally inexpensive; providing a useful degree of robustness against basic replay attacks and against speech or image forgeries. The method is based on a cross-correlation analysis between two streams of features, one from the audio signal and the other from the image sequence. We argue that such an algorithm forms an effective first barrier against several kinds of replay attack that would defeat existing verification systems based on standard multimodal fusion techniques. In order to provide an evaluation mechanism for the new technique we have augmented the protocols that accompany the BANCA multimedia corpus by defining new scenarios. We obtain 0% equal-error rate (EER) on the simplest scenario and 35% on a more challenging one.
Type
Conference Contribution
Type of thesis
Series
Citation
Bredin, H., Miguel, A., Witten, I.H., Chollet, G. (2006). Detecting replay attacks in audiovisual identity verification. In Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006), Vol 1. USA, IEEE, Toulous, France, 14-19 May, 2006(pp. 341-352). Washington, DC, USA: IEEE Computer Society.
Date
2006
Publisher
IEEE Computer Society
Degree
Supervisors
Rights
This article has been published in the Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2006), Vol 1. USA, IEEE, Toulous, France, 14-19 May, 2006. ©2006 IEEE Computer Society. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.