Abstract
We consider mimicry, a simple technology form of attack requiring a low level of expertise, to investigate whether a speaker recognition system is vulnerable to mimicry by an impostor without using the assistance of any other technologies. Experiments on 138 speakers in the YOHO database and two people who played a role as imitators have shown that an impostor can attack the system if that impostor knows a registered speaker in the database who has very similar voice to the impostor's voice
Original language | English |
---|---|
Title of host publication | Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing |
Editors | J Kwok, LM Po |
Place of Publication | Hong Kong |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 145-149 |
Number of pages | 5 |
ISBN (Print) | 0-7803-8688-4 |
Publication status | Published - 2004 |
Event | 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing - , Hong Kong Duration: 19 Oct 2004 → 21 Oct 2004 |
Conference
Conference | 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing |
---|---|
Country/Territory | Hong Kong |
Period | 19/10/04 → 21/10/04 |