The aim of this paper is to determine how vulnerable a speaker verification system is to conscious effort by impostors to mimic a client of the system. The paper explores systematically how much closer an impostor can get to another speaker's voice by repeated attempts. Experiments on 138 speakers in the YOHO database and six people who played a role as imitators showed a fact that professional linguists could successfully attack the system. Non-professional people could have a good chance if they know their closest speaker in the database. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Lau, Y. W., Tran, D., & Wagner, M. (2005). Testing voice mimicry with the YOHO speaker verification corpus. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3684 LNAI, pp. 15–21). Springer Verlag. https://doi.org/10.1007/11554028_3
Mendeley helps you to discover research relevant for your work.