• DocumentCode
    3246288
  • Title

    Vulnerability of speaker verification to voice mimicking

  • Author

    Lau, Yee Wah ; Wagner, Michael ; Tran, Dat

  • Author_Institution
    Sch. of Inf. Sci. & Eng., Univ. of Canberra, ACT, Australia
  • fYear
    2004
  • fDate
    20-22 Oct. 2004
  • Firstpage
    145
  • Lastpage
    148
  • Abstract
    We consider mimicry, a simple technology form of attack requiring a low level of expertise, to investigate whether a speaker recognition system is vulnerable to mimicry by an impostor without using the assistance of any other technologies. Experiments on 138 speakers in the YOHO database and two people who played a role as imitators have shown that an impostor can attack the system if that impostor knows a registered speaker in the database who has very similar voice to the impostor´s voice.
  • Keywords
    biometrics (access control); speaker recognition; speech processing; biometrics; impostor attack; speaker recognition system; speaker verification; voice mimicking; voice mimicry; Biometrics; Computer security; Data security; Databases; Error analysis; Information security; Parameter estimation; Speaker recognition; Speech processing; Speech synthesis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Multimedia, Video and Speech Processing, 2004. Proceedings of 2004 International Symposium on
  • Print_ISBN
    0-7803-8687-6
  • Type

    conf

  • DOI
    10.1109/ISIMP.2004.1434021
  • Filename
    1434021