Testing voice mimicry with the YOHO speaker verification corpus

Yee W. Lau, Dat Tran, Michael Wagner

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

29 Citations (Scopus)

Abstract

The aim of this paper is to determine how vulnerable a speaker verification system is to conscious effort by impostors to mimic a client of the system. The paper explores systematically how much closer an impostor can get to another speaker's voice by repeated attempts. Experiments on 138 speakers in the YOHO database and six people who played a role as imitators showed a fact that professional linguists could successfully attack the system. Non-professional people could have a good chance if they know their closest speaker in the database.

Original languageEnglish
Title of host publicationKnowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings
EditorsRajiv Khosla, Robert J. Howlett, Lakhmi C. Jain
Place of PublicationNetherlands
PublisherSpringer
Pages15-21
Number of pages7
ISBN (Electronic)9783540319832
ISBN (Print)9783540288978
DOIs
Publication statusPublished - 2005
Event9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005 - Melbourne, Australia
Duration: 14 Sept 200516 Sept 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3684 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005
Country/TerritoryAustralia
CityMelbourne
Period14/09/0516/09/05

Fingerprint

Dive into the research topics of 'Testing voice mimicry with the YOHO speaker verification corpus'. Together they form a unique fingerprint.

Cite this