Vulnerability in speaker verification. A study of technical impostor techniques
1999 (English)Conference paper (Refereed)
This paper reports on some ways to try to deceive a state-of-the-art speaker verification (SV) system. In order to evaluate the risk in SV systems one has to take into account the possible intentional impostors who know whom they are attacking. We defined a worst case scenario where the impostor has extensive knowledge about the person to deceive as well as the system to attack. In this framework we tested our SV system against concatenated client speech, re-synthesis of the client speech and diphone synthesis of the client.
Place, publisher, year, edition, pages
1999. 1211-1214 p.
Computer and Information Science
IdentifiersURN: urn:nbn:se:kth:diva-91226OAI: oai:DiVA.org:kth-91226DiVA: diva2:508913
Proc of Eurospeech 99
NR 201408052012-03-102012-03-10Bibliographically approved