Change search
ReferencesLink to record
Permanent link

Direct link
Vulnerability in speaker verification. A study of technical impostor techniques
KTH, School of Computer Science and Communication (CSC), Speech, Music and Hearing, TMH.
1999 (English)Conference paper (Refereed)
Abstract [en]

This paper reports on some ways to try to deceive a state-of-the-art speaker verification (SV) system. In order to evaluate the risk in SV systems one has to take into account the possible intentional impostors who know whom they are attacking. We defined a worst case scenario where the impostor has extensive knowledge about the person to deceive as well as the system to attack. In this framework we tested our SV system against concatenated client speech, re-synthesis of the client speech and diphone synthesis of the client.

Place, publisher, year, edition, pages
1999. 1211-1214 p.
National Category
Computer and Information Science
URN: urn:nbn:se:kth:diva-91226OAI: diva2:508913
Proc of Eurospeech 99
NR 20140805Available from: 2012-03-10 Created: 2012-03-10Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Blomberg, Mats
By organisation
Speech, Music and Hearing, TMH
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 16 hits
ReferencesLink to record
Permanent link

Direct link