메뉴 건너뛰기




Volumn , Issue , 2013, Pages 930-934

I-vectors meet imitators: On vulnerability of speaker verification systems against voice mimicry

Author keywords

Mimicry attack; Speaker recognition; Voice imitation

Indexed keywords

SPEECH PROCESSING;

EID: 84906213805     PISSN: 2308457X     EISSN: 19909772     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (108)

References (21)
  • 1
    • 70350125882 scopus 로고    scopus 로고
    • An overview of text-independent speaker recognition: From features to supervectors
    • January
    • T. Kinnunen and H. Li, "An overview of text-independent speaker recognition: from features to supervectors, " Speech Communication, vol. 52 (1), pp. 12-40, January 2010.
    • (2010) Speech Communication , vol.52 , Issue.1 , pp. 12-40
    • Kinnunen, T.1    Li, H.2
  • 2
    • 84906216788 scopus 로고    scopus 로고
    • [Online]. Available
    • "Speak to unlock, " 2012. [Online]. Available: http://www.i2r.a-star.edu.sg/files/documents/416/ BIRCBringsFirstSpeakerVerificationTechnologyIntoSmartphonesWithBuilt- InVoiceprintFeatureFinal.pdf.
    • (2012) Speak to Unlock
  • 3
    • 79952940570 scopus 로고    scopus 로고
    • Detecting replay attacks from far-field recordings on speaker verification systems
    • J. Villalba and E. Lleida, "Detecting replay attacks from far-field recordings on speaker verification systems, " Biometrics and ID Management, pp. 274-285, 2011.
    • (2011) Biometrics and ID Management , pp. 274-285
    • Villalba, J.1    Lleida, E.2
  • 4
    • 84867600098 scopus 로고    scopus 로고
    • Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
    • Kyoto, Japan, March
    • T. Kinnunen, Z.-Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech, " in Proc. ICASSP, Kyoto, Japan, March 2012, pp. 4401 - 4404.
    • (2012) Proc. ICASSP , pp. 4401-4404
    • Kinnunen, T.1    Wu, Z.-Z.2    Lee, K.A.3    Sedlak, F.4    Chng, E.S.5    Li, H.6
  • 5
    • 84906233506 scopus 로고    scopus 로고
    • Evaluation of the vulnerability of speaker verification to synthetic speech
    • Brno, Czech Republic, June, (paper 28)
    • P. DeLeon, M. Pucher, and J. Yamagishi, "Evaluation of the vulnerability of speaker verification to synthetic speech, " in Odyssey 2010: The Speaker and Language Recognition Workshop, Brno, Czech Republic, June 2010, pp. 151-158 (paper 28).
    • (2010) Odyssey 2010: The Speaker and Language Recognition Workshop , pp. 151-158
    • Deleon, P.1    Pucher, M.2    Yamagishi, J.3
  • 7
    • 39149103755 scopus 로고    scopus 로고
    • Voice disguise and automatic detection: Review and perspectives
    • ser. Lecture Notes in Computer Science
    • P. Perrot, G. Aversano, and G. Chollet, "Voice disguise and automatic detection: Review and perspectives, " in Progress in Nonlinear Speech Processing, ser. Lecture Notes in Computer Science, 2007, pp. 101-117.
    • (2007) Progress in Nonlinear Speech Processing , pp. 101-117
    • Perrot, P.1    Aversano, G.2    Chollet, G.3
  • 8
    • 38149118064 scopus 로고    scopus 로고
    • Detection of speaker characteristics using voice imitation
    • ser. Lecture Notes in Computer Science
    • E. Zetterholm, "Detection of speaker characteristics using voice imitation, " in Speaker Classification II, ser. Lecture Notes in Computer Science, 2007, pp. 192-205.
    • (2007) Speaker Classification II , pp. 192-205
    • Zetterholm, E.1
  • 9
    • 27544482501 scopus 로고    scopus 로고
    • Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification
    • Jan
    • A. Ogihara, H. Unno, and A. Shiozaki, "Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification, " IEICE Trnas. Fundamentals, vol. E88-A, no. 1, pp. 280-286, Jan. 2005.
    • (2005) IEICE Trnas. Fundamentals , vol.E88-A , Issue.1 , pp. 280-286
    • Ogihara, A.1    Unno, H.2    Shiozaki, A.3
  • 13
    • 84928920684 scopus 로고    scopus 로고
    • Can a professional imitator fool a GMM-based speaker verification system?
    • J. Mariethoz and S. Bengio, "Can a professional imitator fool a gmm-based speaker verification system?" IDIAP, Idiap-RR, 2005.
    • (2005) IDIAP, IDIAP-RR
    • Mariethoz, J.1    Bengio, S.2
  • 15
    • 33947637189 scopus 로고    scopus 로고
    • Joint factor analysis of speaker and session variability: Theory and algorithms
    • Montreal, CRIM
    • P. Kenny, "Joint factor analysis of speaker and session variability: theory and algorithms, " technical report CRIM-06/08-14, Montreal, CRIM, 2006.
    • (2006) Technical Report CRIM-06/08-14
    • Kenny, P.1
  • 16
    • 0033884858 scopus 로고    scopus 로고
    • Speaker verification using adapted gaussian mixture models
    • Jan
    • D. Reynolds, T. Quatieri, and R. Dunn, "Speaker verification using adapted Gaussian mixture models, " DSP, vol. 10, no. 1, pp. 19-41, Jan 2000.
    • (2000) DSP , vol.10 , Issue.1 , pp. 19-41
    • Reynolds, D.1    Quatieri, T.2    Dunn, R.3
  • 17
    • 79951609039 scopus 로고    scopus 로고
    • Front-end factor analysis for speaker verification
    • May
    • N. Dehak, P. Kenny, R. Dehak, P. Dumouchel, and P. Ouellet, "Front-end factor analysis for speaker verification, " ITASLP, vol. 19, no. 4, pp. 788-798, May 2011.
    • (2011) ITASLP , vol.19 , Issue.4 , pp. 788-798
    • Dehak, N.1    Kenny, P.2    Dehak, R.3    Dumouchel, P.4    Ouellet, P.5
  • 18
    • 0032664931 scopus 로고    scopus 로고
    • An experimental study of speaker verification sensitivity to computer voice-altered imposters
    • Phoenix, Arizona, USA, March
    • B. Pellom and J. Hansen, "An experimental study of speaker verification sensitivity to computer voice-altered imposters, " in ICASSP, Phoenix, Arizona, USA, March 1999, pp. 837-840.
    • (1999) ICASSP , pp. 837-840
    • Pellom, B.1    Hansen, J.2
  • 19
    • 84890503314 scopus 로고    scopus 로고
    • Evaluation of mimicked speech using prosodic features
    • Vancouver, May
    • L. Mary, A. B. K. K. A. Joseph, and G. M. George, "Evaluation of mimicked speech using prosodic features, " in ICASSP 2013, Vancouver, May 2013, pp. 7189 - 7193.
    • (2013) ICASSP 2013 , pp. 7189-7193
    • Mary, L.1    Joseph, A.B.K.K.A.2    George, G.M.3
  • 20
    • 84865733857 scopus 로고    scopus 로고
    • Analysis of I-vector length normalization in speaker recognition systems
    • Florence, Italy, August
    • D. Garcia-Romero and C. Y. Espy-Wilson, "Analysis of i-vector length normalization in speaker recognition systems, " in Interspeech 2011, Florence, Italy, August 2011, pp. 249-252.
    • (2011) Interspeech 2011 , pp. 249-252
    • Garcia-Romero, D.1    Espy-Wilson, C.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.