Voice conversion versus speaker verification: an overview
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based on a speech sample. Recently, a major progress was made in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major conc...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/81495 http://hdl.handle.net/10220/40819 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-81495 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-814952020-09-26T22:17:29Z Voice conversion versus speaker verification: an overview Wu, Zhizheng Li, Haizhou School of Computer Science and Engineering Temasek Laboratories Speaker verification Voice conversion Spoofing attack Anti-spoofing Countermeasure Security A speaker verification system automatically accepts or rejects a claimed identity of a speaker based on a speech sample. Recently, a major progress was made in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major concern when deploying speaker verification technology is whether a system is robust against spoofing attacks. Speaker verification studies provided us a good insight into speaker characterization, which has contributed to the progress of voice conversion technology. Unfortunately, voice conversion has become one of the most easily accessible techniques to carry out spoofing attacks; therefore, presents a threat to speaker verification systems. In this paper, we will briefly introduce the fundamentals of voice conversion and speaker verification technologies. We then give an overview of recent spoofing attack studies under different conditions with a focus on voice conversion spoofing attack. We will also discuss anti-spoofing attack measures for speaker verification. Published version 2016-06-28T06:36:27Z 2019-12-06T14:32:15Z 2016-06-28T06:36:27Z 2019-12-06T14:32:15Z 2014 Journal Article Wu, Z., & Li, H. (2014). Voice conversion versus speaker verification: an overview. APSIPA Transactions on Signal and Information Processing, 3, e17-. 2048-7703 https://hdl.handle.net/10356/81495 http://hdl.handle.net/10220/40819 10.1017/ATSIP.2014.17 en APSIPA Transactions on Signal and Information Processing © 2014 The Authors (published by Cambridge University Press and Asia-Pacific Signal and Information Processing Association). The online version of this article is published within an Open Access environment subject to the conditions of the Creative Commons Attribution-NonCommercial-ShareAlike license <http://creativecommons.org/licenses/by-nc-sa/3.0/>. The written permission of Cambridge University Press must be obtained for commercial re-use. 16 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
Speaker verification Voice conversion Spoofing attack Anti-spoofing Countermeasure Security |
spellingShingle |
Speaker verification Voice conversion Spoofing attack Anti-spoofing Countermeasure Security Wu, Zhizheng Li, Haizhou Voice conversion versus speaker verification: an overview |
description |
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based on a speech sample. Recently, a major progress was made in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major concern when deploying speaker verification technology is whether a system is robust against spoofing attacks. Speaker verification studies provided us a good insight into speaker characterization, which has contributed to the progress of voice conversion technology. Unfortunately, voice conversion has become one of the most easily accessible techniques to carry out spoofing attacks; therefore, presents a threat to speaker verification systems. In this paper, we will briefly introduce the fundamentals of voice conversion and speaker verification technologies. We then give an overview of recent spoofing attack studies under different conditions with a focus on voice conversion spoofing attack. We will also discuss anti-spoofing attack measures for speaker verification. |
author2 |
School of Computer Science and Engineering |
author_facet |
School of Computer Science and Engineering Wu, Zhizheng Li, Haizhou |
format |
Article |
author |
Wu, Zhizheng Li, Haizhou |
author_sort |
Wu, Zhizheng |
title |
Voice conversion versus speaker verification: an overview |
title_short |
Voice conversion versus speaker verification: an overview |
title_full |
Voice conversion versus speaker verification: an overview |
title_fullStr |
Voice conversion versus speaker verification: an overview |
title_full_unstemmed |
Voice conversion versus speaker verification: an overview |
title_sort |
voice conversion versus speaker verification: an overview |
publishDate |
2016 |
url |
https://hdl.handle.net/10356/81495 http://hdl.handle.net/10220/40819 |
_version_ |
1681057179254128640 |