Vulnerability of Speaker Verification to Voice Mimicking

Yee Wah Lau, Michael Wagner, Dat Tran

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

124 Citations (Scopus)
116 Downloads (Pure)

Abstract

We consider mimicry, a simple technology form of attack requiring a low level of expertise, to investigate whether a speaker recognition system is vulnerable to mimicry by an impostor without using the assistance of any other technologies. Experiments on 138 speakers in the YOHO database and two people who played a role as imitators have shown that an impostor can attack the system if that impostor knows a registered speaker in the database who has very similar voice to the impostor's voice
Original languageEnglish
Title of host publicationProceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing
EditorsJ Kwok, LM Po
Place of PublicationHong Kong
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages145-149
Number of pages5
ISBN (Print)0-7803-8688-4
Publication statusPublished - 2004
Event2004 International Symposium on Intelligent Multimedia, Video and Speech Processing - , Hong Kong
Duration: 19 Oct 200421 Oct 2004

Conference

Conference2004 International Symposium on Intelligent Multimedia, Video and Speech Processing
Country/TerritoryHong Kong
Period19/10/0421/10/04

Fingerprint

Dive into the research topics of 'Vulnerability of Speaker Verification to Voice Mimicking'. Together they form a unique fingerprint.

Cite this