Spoofing and countermeasures for speaker verification: A survey

Z Wu, N Evans, T Kinnunen, J Yamagishi, F Alegre… - speech …, 2015 - Elsevier
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …

An overview of text-independent speaker recognition: From features to supervectors

T Kinnunen, H Li - Speech communication, 2010 - Elsevier
This paper gives an overview of automatic speaker recognition technology, with an
emphasis on text-independent recognition. Speaker recognition has been studied actively …

A study of interspeaker variability in speaker verification

P Kenny, P Ouellet, N Dehak, V Gupta… - … on Audio, Speech …, 2008 - ieeexplore.ieee.org
We propose a new approach to the problem of estimating the hyperparameters which define
the interspeaker variability model in joint factor analysis. We tested the proposed estimation …

[PDF][PDF] Spoofing and countermeasures for automatic speaker verification

NWD Evans, T Kinnunen… - … 2013, 14th Annual …, 2013 - research.ed.ac.uk
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also
known as imposture. While vulnerabilities and countermeasures for other biometric …

Fusion of heterogeneous speaker recognition systems in the STBU submission for the NIST speaker recognition evaluation 2006

N Brummer, L Burget, J Cernocky… - … on Audio, Speech …, 2007 - ieeexplore.ieee.org
This paper describes and discusses the" STBU" speaker recognition system, which
performed well in the NIST Speaker Recognition Evaluation 2006 (SRE). STBU is a …

All your voices are belong to us: Stealing voices to fool humans and machines

D Mukhopadhyay, M Shirvanian, N Saxena - … Security--ESORICS 2015 …, 2015 - Springer
In this paper, we study voice impersonation attacks to defeat humans and machines.
Equipped with the current advancement in automated speech synthesis, our attacker can …

A practical, self-adaptive voice activity detector for speaker verification with noisy telephone and microphone data

T Kinnunen, P Rajan - 2013 IEEE international conference on …, 2013 - ieeexplore.ieee.org
A voice activity detector (VAD) plays a vital role in robust speaker verification, where energy
VAD is most commonly used. Energy VAD works well in noise-free conditions but …

Diarization of telephone conversations using factor analysis

P Kenny, D Reynolds, F Castaldo - IEEE Journal of Selected …, 2010 - ieeexplore.ieee.org
We report on work on speaker diarization of telephone conversations which was begun at
the Robust Speaker Recognition Workshop held at Johns Hopkins University in 2008. Three …

[PDF][PDF] Распознавание личности по голосу: аналитический обзор

ВН Сорокин, ВВ Вьюгин, АА Тананыкин - Информационные процессы, 2012 - jip.ru
Задача распознавания диктора по его голосу была поставлена более 40 лет тому
назад, и исследования в этой области все еще продолжаются. Решение этой задачи …

Deep features for automatic spoofing detection

Y Qian, N Chen, K Yu - Speech Communication, 2016 - Elsevier
Recently biometric authentication has made progress in areas, such as speaker verification.
However, some evidence shows that the technology is susceptible to malicious spoofing …