메뉴 건너뛰기




Volumn , Issue , 2012, Pages 36-40

On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals

Author keywords

biometrics; imposture; speaker verification; spoofing

Indexed keywords

ARTIFICIAL SIGNALS; AUTOMATIC SPEAKER RECOGNITION; AUTOMATIC SPEAKER VERIFICATION; BIOMETRIC AUTHENTICATION; EQUAL ERROR RATE; GAUSSIAN MIXTURE MODEL; IMPOSTURE; SPEAKER VERIFICATION; SPOOFING; SPOOFING ATTACKS;

EID: 84869773314     PISSN: 22195491     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (58)

References (16)
  • 1
    • 3142739783 scopus 로고    scopus 로고
    • On the vulnerability of biometric security systems
    • june
    • M. Faundez-Zanuy, "On the vulnerability of biometric security systems," IEEE Aerospace and Electronic Systems Magazine, vol. 19, no. 6, pp. 3-8, june 2004.
    • (2004) IEEE Aerospace and Electronic Systems Magazine , vol.19 , Issue.6 , pp. 3-8
    • Faundez-Zanuy, M.1
  • 2
    • 84893210778 scopus 로고    scopus 로고
    • How vulnerable are prosodic features to professional imitators?
    • M. Farrs, M. Wagner, J. Anguita, and J. Hern, "How vulnerable are prosodic features to professional imitators?," in Odyssey, 2008.
    • (2008) Odyssey
    • Farrs, M.1    Wagner, M.2    Anguita, J.3    Hern, J.4
  • 3
    • 84890478111 scopus 로고    scopus 로고
    • Speaker verification scores and acoustic analysis of a professional impersonator
    • M. Blomberg, D. Elenius, and E. Zetterholm, "Speaker verification scores and acoustic analysis of a professional impersonator," in FONETIK, 2004.
    • (2004) FONETIK
    • Blomberg, M.1    Elenius, D.2    Zetterholm, E.3
  • 5
    • 84867605072 scopus 로고    scopus 로고
    • Speaker verification performance degradation against spoofing and tampering attacks
    • J. Villalba and E. Lleida, "Speaker verification performance degradation against spoofing and tampering attacks," in FALA workshop, 2010, pp. 131-134.
    • (2010) FALA workshop , pp. 131-134
    • Villalba, J.1    Lleida, E.2
  • 7
    • 65349113532 scopus 로고    scopus 로고
    • Artificial impostor voice transformation effects on false acceptance rates
    • J.-F. Bonastre, D. Matrouf, and C. Fredouille, "Artificial impostor voice transformation effects on false acceptance rates," in Proc. Interspeech, 2007, pp. 2053-2056.
    • (2007) Proc. Interspeech , pp. 2053-2056
    • Bonastre, J.-F.1    Matrouf, D.2    Fredouille, C.3
  • 8
    • 84867600098 scopus 로고    scopus 로고
    • Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
    • T. Kinnunen, Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of Speaker Verification Systems Against Voice Conversion Spoofing Attacks: the case of Telephone Speech," in Proc. ICASSP, 2012, pp. 4401-4404.
    • (2012) Proc. ICASSP , pp. 4401-4404
    • Kinnunen, T.1    Wu, Z.2    Lee, K.A.3    Sedlak, F.4    Chng, E.S.5    Li, H.6
  • 9
    • 85135274466 scopus 로고    scopus 로고
    • On the security of hmm-based speaker verification systems against imposture using synthetic speech
    • T. Masuko, T. Hitotsumatsu, K. Tokuda, and T. Kobayashi, "On the security of HMM-based speaker verification systems against imposture using synthetic speech," in EUROSPEECH, 1999.
    • (1999) EUROSPEECH
    • Masuko, T.1    Hitotsumatsu, T.2    Tokuda, K.3    Kobayashi, T.4
  • 11
    • 4444228585 scopus 로고    scopus 로고
    • Genetic algorithm based rbf neural network for voice conversion
    • june
    • G. Zuo and W. Liu, "Genetic algorithm based RBF neural network for voice conversion," in Fifth World Congress on Intelligent Control and Automation, june 2004, vol. 5, pp. 4215-4218.
    • (2004) Fifth World Congress on Intelligent Control and Automation , vol.5 , pp. 4215-4218
    • Zuo, G.1    Liu, W.2
  • 13
    • 0038548330 scopus 로고    scopus 로고
    • The production and recognition of emotions in speech: Features and algorithms
    • P.-Y. Oudeyer, "The production and recognition of emotions in speech: Features and Algorithms," International Journal of Human-Computer Studies, vol. 59, pp. 157-183, 2003.
    • (2003) International Journal of Human-Computer Studies , vol.59 , pp. 157-183
    • Oudeyer, P.-Y.1
  • 14
    • 84869758839 scopus 로고    scopus 로고
    • Nist'04 speaker recognition evaluation campaign: New lia speaker detection platform based on alize toolkit
    • J.-F. Bonastre, N. Scheffer, C. Fredouille, and D. Matrouf, "NIST'04 speaker recognition evaluation campaign: new LIA speaker detection platform based on ALIZE toolkit," in NIST SRE'04, 2004.
    • (2004) NIST SRE'04
    • Bonastre, J.-F.1    Scheffer, N.2    Fredouille, C.3    Matrouf, D.4
  • 16
    • 56149126578 scopus 로고    scopus 로고
    • A straightforward and efficient implementation of the factor analysis model for speaker verification
    • D. Matrouf, N. Scheffer, B. Fauve, and J.-F. Bonastre, "A straightforward and efficient implementation of the factor analysis model for speaker verification," in Proc. Interspeech, 2007.
    • (2007) Proc. Interspeech
    • Matrouf, D.1    Scheffer, N.2    Fauve, B.3    Bonastre, J.-F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.