Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech

Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks...

Full description

Bibliographic Details
Main Authors: Kinnunen, Tomi, Wu, Zhizheng, Lee, Kong Aik, Sedlak, Filip, Chng, Eng Siong, Li, Haizhou
Other Authors: School of Computer Engineering
Format: Conference Paper
Language:English
Published: 2013
Subjects:
Online Access:https://hdl.handle.net/10356/98757
http://hdl.handle.net/10220/13414