메뉴 건너뛰기




Volumn , Issue , 2014, Pages 137-144

Comparison of human listeners and speaker verification systems using voice mimicry data

Author keywords

[No Author keywords available]

Indexed keywords

AUDIO SYSTEMS; ERRORS; GAUSSIAN DISTRIBUTION;

EID: 84929624509     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (29)
  • 1
    • 70350125882 scopus 로고    scopus 로고
    • An overview of text-independent speaker recognition: From features to supervectors
    • January
    • T. Kinnunen and H. Li, "An overview of text-independent speaker recognition: from features to supervectors," Speech Communication, vol. 52 (1), pp. 12-40, January 2010.
    • (2010) Speech Communication , vol.52 , Issue.1 , pp. 12-40
    • Kinnunen, T.1    Li, H.2
  • 2
    • 37849041688 scopus 로고    scopus 로고
    • Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the nist 1998 speaker recognition evaluation
    • G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, "Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the nist 1998 speaker recognition evaluation," in ICSLP, 1998, vol. 13.
    • (1998) ICSLP , vol.13
    • Doddington, G.1    Liggett, W.2    Martin, A.3    Przybocki, M.4    Reynolds, D.5
  • 4
    • 84906263293 scopus 로고    scopus 로고
    • Spoofing and countermeasures for automatic speaker verification
    • Lyon, France, August
    • N. Evans, T. Kinnunen, and J. Yamagishi, "Spoofing and countermeasures for automatic speaker verification," in Interspeech 2013, Lyon, France, August 2013, pp. 925-929.
    • (2013) Interspeech 2013 , pp. 925-929
    • Evans, N.1    Kinnunen, T.2    Yamagishi, J.3
  • 5
    • 84867600098 scopus 로고    scopus 로고
    • Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
    • Kyoto, Japan, March
    • T. Kinnunen, Z.-Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech," in ICASSP 2012, Kyoto, Japan, March 2012, pp. 4401-4404.
    • (2012) ICASSP 2012 , pp. 4401-4404
    • Kinnunen, T.1    Wu, Z.-Z.2    Lee, K.A.3    Sedlak, F.4    Chng, E.S.5    Li, H.6
  • 7
    • 79952940570 scopus 로고    scopus 로고
    • Detecting replay attacks from far-field recordings on speaker verification systems
    • J. Villalba and E. Lleida, "Detecting replay attacks from far-field recordings on speaker verification systems," Biometrics and ID Management, pp. 274-285, 2011.
    • (2011) Biometrics and ID Management , pp. 274-285
    • Villalba, J.1    Lleida, E.2
  • 11
    • 84890503314 scopus 로고    scopus 로고
    • Evaluation of mimicked speech using prosodic features
    • Vancouver, May
    • Leena Mary, Anish Babu K. K, Aju Joseph, and Gibin M. George, "Evaluation of mimicked speech using prosodic features," in ICASSP 2013, Vancouver, May 2013, pp. 7189-7193.
    • (2013) ICASSP 2013 , pp. 7189-7193
    • Mary, L.1    Anish Babu, K.K.2    Joseph, A.3    George, G.M.4
  • 14
    • 84928920684 scopus 로고    scopus 로고
    • Can a professional imitator fool a GMM-based speaker verification system?
    • J. Mariéthoz and S. Bengio, "Can a professional imitator fool a GMM-based speaker verification system?," Idiaprr, IDIAP, 2005.
    • (2005) Idiaprr, IDIAP
    • Mariéthoz, J.1    Bengio, S.2
  • 15
    • 84906213805 scopus 로고    scopus 로고
    • I-vector meet imitators: On vulnerability of speaker verification systems against voice mimicry
    • Lyon, France, August
    • R. González Hautamäki, T. Kinnunen, V. Hautamäki, T. Leino, and A-M. Laukkanen, "I-vector meet imitators: on vulnerability of speaker verification systems against voice mimicry," in Interspeech 2013, Lyon, France, August 2013.
    • (2013) Interspeech 2013
    • González Hautamäki, R.1    Kinnunen, T.2    Hautamäki, V.3    Leino, T.4    Laukkanen, A.-M.5
  • 16
    • 0033889739 scopus 로고    scopus 로고
    • Speaker verification by human listeners: Experiments comparing human and machine performance using the NIST 1998 speaker evaluation data
    • A. Schmidt-Nielsen and T. H. Crystal, "Speaker verification by human listeners: Experiments comparing human and machine performance using the NIST 1998 speaker evaluation data," Digital Signal Processing, vol. 10, no. 13, pp. 249-266, 2000.
    • (2000) Digital Signal Processing , vol.10 , Issue.13 , pp. 249-266
    • Schmidt-Nielsen, A.1    Crystal, T.H.2
  • 17
    • 79959816522 scopus 로고    scopus 로고
    • Approaching human listener accuracy with modern speaker verification
    • Makuhari, Japan, September
    • V. Hautamäki, T. Kinnunen, M. Nosratighods, Kong Aik Lee, Bin Ma, and Haizhou Li, "Approaching human listener accuracy with modern speaker verification," in Interspeech 2010, Makuhari, Japan, September 2010, pp. 1473-1476.
    • (2010) Interspeech 2010 , pp. 1473-1476
    • Hautamäki, V.1    Kinnunen, T.2    Nosratighods, M.3    Aik Lee, K.4    Ma, B.5    Li, H.6
  • 18
    • 80051602409 scopus 로고    scopus 로고
    • Including human expertise in speaker recognition systems: Report on a pilot evaluation
    • Prague, Czech Republic, May
    • C. Greenberg, A. Martin, G. Doddington, and J. Godfrey, "Including human expertise in speaker recognition systems: report on a pilot evaluation," in ICASSP 2011, Prague, Czech Republic, May 2011, p. 5896 5899.
    • (2011) ICASSP 2011 , pp. 5896-5899
    • Greenberg, C.1    Martin, A.2    Doddington, G.3    Godfrey, J.4
  • 19
    • 84906241746 scopus 로고    scopus 로고
    • Merging human and automatic system decisions to improve speaker recognition performance
    • Lyon, France, August
    • R. González Hautamäki, V. Hautamäki, P. Rajan, and T. Kinnunen, "Merging human and automatic system decisions to improve speaker recognition performance," in Interspeech 2013, Lyon, France, August 2013.
    • (2013) Interspeech 2013
    • González Hautamäki, R.1    Hautamäki, V.2    Rajan, P.3    Kinnunen, T.4
  • 21
    • 0021892216 scopus 로고
    • Speech enhancement using a minimum mean-square error log-spectral amplitude estimator
    • Apr
    • Y. Ephraim and D. Malah, "Speech enhancement using a minimum mean-square error log-spectral amplitude estimator," Acoustics, Speech and Signal Processing, IEEE Transactions on, vol. 33, no. 2, pp. 443-445, Apr 1985.
    • (1985) Acoustics, Speech and Signal Processing, IEEE Transactions on , vol.33 , Issue.2 , pp. 443-445
    • Ephraim, Y.1    Malah, D.2
  • 24
    • 0033884858 scopus 로고    scopus 로고
    • Speaker verification using adapted Gaussian mixture models
    • Jan
    • D.A. Reynolds, T.F. Quatieri, and R.B. Dunn, "Speaker verification using adapted Gaussian mixture models," Digital Signal Processing, vol. 10, no. 1, pp. 19-41, Jan 2000.
    • (2000) Digital Signal Processing , vol.10 , Issue.1 , pp. 19-41
    • Reynolds, D.A.1    Quatieri, T.F.2    Dunn, R.B.3
  • 25
    • 79951609039 scopus 로고    scopus 로고
    • Front-end factor analysis for speaker verification
    • May
    • N. Dehak, P.J. Kenny, R. Dehak, P. Dumouchel, and P. Ouellet, "Front-end factor analysis for speaker verification," ITASLP, vol. 19, no. 4, pp. 788-798, May 2011.
    • (2011) ITASLP , vol.19 , Issue.4 , pp. 788-798
    • Dehak, N.1    Kenny, P.J.2    Dehak, R.3    Dumouchel, P.4    Ouellet, P.5
  • 26
    • 84865733857 scopus 로고    scopus 로고
    • Analysis of i-vector length normalization in speaker recognition systems
    • Florence, Italy, August
    • D. Garcia-Romero and C. Y. Espy-Wilson, "Analysis of i-vector length normalization in speaker recognition systems," in Interspeech 2011, Florence, Italy, August 2011, pp. 249-252.
    • (2011) Interspeech 2011 , pp. 249-252
    • Garcia-Romero, D.1    Espy-Wilson, C.Y.2
  • 28
    • 85073147004 scopus 로고    scopus 로고
    • Voicebox: Speech processing toolbox for matlab
    • Mike Brookes et al., "Voicebox: Speech processing toolbox for matlab," Software, available [January 2014] from www. ee. ic. ac. uk/hp/staff/dmb/voicebox/voicebox. html, 2006.
    • (2006) Software
    • Brookes, M.1
  • 29
    • 0001072895 scopus 로고
    • The use of confidence or fiducial limits illustrated in the case of the binomial
    • C. Clopper and E. S. Pearson, "The use of confidence or fiducial limits illustrated in the case of the binomial," Biometrika, vol. 26, pp. 404-413, 1934.
    • (1934) Biometrika , vol.26 , pp. 404-413
    • Clopper, C.1    Pearson, E.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.