Vulnerability of speaker verification systems against voice conversion spoofing attacks : the case of telephone speech
Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks...
Main Authors: | Kinnunen, Tomi, Wu, Zhizheng, Lee, Kong Aik, Sedlak, Filip, Chng, Eng Siong, Li, Haizhou |
---|---|
Other Authors: | School of Computer Engineering |
Format: | Conference Paper |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/98757 http://hdl.handle.net/10220/13414 |
Similar Items
-
Mixture of factor analyzers using priors from non-parallel speech for voice conversion
by: Wu, Zhizheng, et al.
Published: (2013) -
An investigation of spoofing speech detection under additive noise and reverberant conditions
by: Tian, Xiaohai, et al.
Published: (2019) -
Voice conversion versus speaker verification: an overview
by: Wu, Zhizheng, et al.
Published: (2016) -
Spoofing speech detection using temporal convolutional neural network
by: Xiao, Xiong, et al.
Published: (2018) -
Spoofing detection from a feature representation perspective
by: Tian, Xiaohai, et al.
Published: (2018)