Vulnerability of Speaker Verification to Voice Mimicking

Yee Wah Lau, Michael Wagner, Dat Tran

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    70 Citations (Scopus)

    Abstract

    We consider mimicry, a simple technology form of attack requiring a low level of expertise, to investigate whether a speaker recognition system is vulnerable to mimicry by an impostor without using the assistance of any other technologies. Experiments on 138 speakers in the YOHO database and two people who played a role as imitators have shown that an impostor can attack the system if that impostor knows a registered speaker in the database who has very similar voice to the impostor's voice
    Original languageEnglish
    Title of host publicationProceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing
    EditorsJ Kwok, LM Po
    Place of PublicationHong Kong
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages145-149
    Number of pages5
    ISBN (Print)0-7803-8688-4
    Publication statusPublished - 2004
    Event2004 International Symposium on Intelligent Multimedia, Video and Speech Processing - , Hong Kong
    Duration: 19 Oct 200421 Oct 2004

    Conference

    Conference2004 International Symposium on Intelligent Multimedia, Video and Speech Processing
    CountryHong Kong
    Period19/10/0421/10/04

    Fingerprint

    Experiments

    Cite this

    Lau, Y. W., Wagner, M., & Tran, D. (2004). Vulnerability of Speaker Verification to Voice Mimicking. In J. Kwok, & LM. Po (Eds.), Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing (pp. 145-149). Hong Kong: IEEE, Institute of Electrical and Electronics Engineers.
    Lau, Yee Wah ; Wagner, Michael ; Tran, Dat. / Vulnerability of Speaker Verification to Voice Mimicking. Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing. editor / J Kwok ; LM Po. Hong Kong : IEEE, Institute of Electrical and Electronics Engineers, 2004. pp. 145-149
    @inproceedings{2fe5101925664d01a4f2dfdac8c09505,
    title = "Vulnerability of Speaker Verification to Voice Mimicking",
    abstract = "We consider mimicry, a simple technology form of attack requiring a low level of expertise, to investigate whether a speaker recognition system is vulnerable to mimicry by an impostor without using the assistance of any other technologies. Experiments on 138 speakers in the YOHO database and two people who played a role as imitators have shown that an impostor can attack the system if that impostor knows a registered speaker in the database who has very similar voice to the impostor's voice",
    author = "Lau, {Yee Wah} and Michael Wagner and Dat Tran",
    year = "2004",
    language = "English",
    isbn = "0-7803-8688-4",
    pages = "145--149",
    editor = "J Kwok and LM Po",
    booktitle = "Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing",
    publisher = "IEEE, Institute of Electrical and Electronics Engineers",
    address = "United States",

    }

    Lau, YW, Wagner, M & Tran, D 2004, Vulnerability of Speaker Verification to Voice Mimicking. in J Kwok & LM Po (eds), Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing. IEEE, Institute of Electrical and Electronics Engineers, Hong Kong, pp. 145-149, 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, Hong Kong, 19/10/04.

    Vulnerability of Speaker Verification to Voice Mimicking. / Lau, Yee Wah; Wagner, Michael; Tran, Dat.

    Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing. ed. / J Kwok; LM Po. Hong Kong : IEEE, Institute of Electrical and Electronics Engineers, 2004. p. 145-149.

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    TY - GEN

    T1 - Vulnerability of Speaker Verification to Voice Mimicking

    AU - Lau, Yee Wah

    AU - Wagner, Michael

    AU - Tran, Dat

    PY - 2004

    Y1 - 2004

    N2 - We consider mimicry, a simple technology form of attack requiring a low level of expertise, to investigate whether a speaker recognition system is vulnerable to mimicry by an impostor without using the assistance of any other technologies. Experiments on 138 speakers in the YOHO database and two people who played a role as imitators have shown that an impostor can attack the system if that impostor knows a registered speaker in the database who has very similar voice to the impostor's voice

    AB - We consider mimicry, a simple technology form of attack requiring a low level of expertise, to investigate whether a speaker recognition system is vulnerable to mimicry by an impostor without using the assistance of any other technologies. Experiments on 138 speakers in the YOHO database and two people who played a role as imitators have shown that an impostor can attack the system if that impostor knows a registered speaker in the database who has very similar voice to the impostor's voice

    M3 - Conference contribution

    SN - 0-7803-8688-4

    SP - 145

    EP - 149

    BT - Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing

    A2 - Kwok, J

    A2 - Po, LM

    PB - IEEE, Institute of Electrical and Electronics Engineers

    CY - Hong Kong

    ER -

    Lau YW, Wagner M, Tran D. Vulnerability of Speaker Verification to Voice Mimicking. In Kwok J, Po LM, editors, Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing. Hong Kong: IEEE, Institute of Electrical and Electronics Engineers. 2004. p. 145-149