Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech
Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks...
Saved in:
Main Authors: | Kinnunen, Tomi, Wu, Zhizheng, Lee, Kong Aik, Sedlak, Filip, Chng, Eng Siong, Li, Haizhou |
---|---|
Other Authors: | School of Computer Engineering |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/98757 http://hdl.handle.net/10220/13414 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Voice conversion versus speaker verification: an overview
by: Wu, Zhizheng, et al.
Published: (2016) -
Mixture of factor analyzers using priors from non-parallel speech for voice conversion
by: Wu, Zhizheng, et al.
Published: (2013) -
An investigation of spoofing speech detection under additive noise and reverberant conditions
by: Tian, Xiaohai, et al.
Published: (2019) -
Spoofing speech detection using temporal convolutional neural network
by: Xiao, Xiong, et al.
Published: (2018) -
Robust speaker verification system with anti-spoofing detection and DNN feature enhancement modules
by: Du, Steven
Published: (2015)