Research Article

Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference

Table 1

The SR of spoofing attack. SR1 aims at LDA classification and SR2 aims at cosine similarity threshold classification. C1 represents the generalized relevancy based attack and C2 represents the multifactor based attack.

C1C2

SR1 (%)8380
SR2 (%)8682