Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech

Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks...

全面介紹

Saved in:
書目詳細資料
Main Authors: Kinnunen, Tomi, Wu, Zhizheng, Lee, Kong Aik, Sedlak, Filip, Chng, Eng Siong, Li, Haizhou
其他作者: School of Computer Engineering
格式: Conference or Workshop Item
語言:English
出版: 2013
主題:
在線閱讀:https://hdl.handle.net/10356/98757
http://hdl.handle.net/10220/13414
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!