Revisiting Carl Bildt's impostor: Would a speaker verification system foil him?

5Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Impostors pose a potential threat to security systems that rely on human identification and verification based on voice alone and to security systems that make use of computer audio-based person authentication systems. This paper presents a case-study, which explores these issues using recordings of a high quality professional impersonation of a well-known Swedish politician. These recordings were used in the role of impostor in the experiments reported here. The experiments using human listeners showed that an impostor who can closely imitate the speech of the target voice can result in confusion and, therefore, can pose a threat to security systems that rely on human identification and verification. In contrast, an established Gaussian mixture model based speaker identification system was employed to distinguish the recordings. It was shown that the recognition engine was capable of classifying the mimic attacks more appropriately. © Springer-Verlag 2001.

Cite

CITATION STYLE

APA

Sullivan, K. P. H., & Pelecanos, J. (2001). Revisiting Carl Bildt’s impostor: Would a speaker verification system foil him? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2091 LNCS, pp. 144–149). Springer Verlag. https://doi.org/10.1007/3-540-45344-x_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free