Comunicació presentada a: IV Jornadas de Reconocimiento Biométrico de Personas, celebrades a Valladolid de l'11 al 12 de setembre de 2008Security systems relying on voice identification can be threatened by human voice imitation or synthetic voices. As voice conversion can be seen as a sort of voice imitation, this paper analyses the performance of an automatic speaker identification system by using converted voices in order to know how vulnerable such systems are to this kind of disguise. The experiments are conducted by using intra-gender and cross-gender conversions between two males and two females. The results show that, in general terms, the system is more robust to intra-gender converted voices than to cross-gender ones
Voice conversion – the methodology of automatically convert-ing one’s utterances to sound as if spok...
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based...
In this work, we compare the performance of human listeners and two well known speaker verification ...
Producción CientíficaSecurity systems relying on voice identification can be threatened by human voi...
Voices can be deliberately disguised by means of human imitation or voice conversion. The question ...
Voices can be deliberately disguised by means of human imitation or voice conversion. The question a...
Over the last years, automatic speaker recognition (ASR) has undergone an increasing use in applicat...
Over the last years, automatic speaker recognition (ASR) has undergone an increasing use in applicat...
Voice imitation is one of the potential threats to security systems that use automatic speaker recog...
Comunicació presentada a: Odyssey 2008: The Speaker and Language Recognition Workshop; Stellenbosch ...
Comunicació presentada a: Odyssey 2008: The Speaker and Language Recognition Workshop; Stellenbosch ...
Voice transformation refers to a class of techniques that modify the voice charac-teristics either t...
International audienceThis paper investigates the effect of a transfer function-based voice transfor...
Comunicació presentada a 9th Annual Conference of the International Speech Communication Association...
Comunicació presentada a 9th Annual Conference of the International Speech Communication Association...
Voice conversion – the methodology of automatically convert-ing one’s utterances to sound as if spok...
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based...
In this work, we compare the performance of human listeners and two well known speaker verification ...
Producción CientíficaSecurity systems relying on voice identification can be threatened by human voi...
Voices can be deliberately disguised by means of human imitation or voice conversion. The question ...
Voices can be deliberately disguised by means of human imitation or voice conversion. The question a...
Over the last years, automatic speaker recognition (ASR) has undergone an increasing use in applicat...
Over the last years, automatic speaker recognition (ASR) has undergone an increasing use in applicat...
Voice imitation is one of the potential threats to security systems that use automatic speaker recog...
Comunicació presentada a: Odyssey 2008: The Speaker and Language Recognition Workshop; Stellenbosch ...
Comunicació presentada a: Odyssey 2008: The Speaker and Language Recognition Workshop; Stellenbosch ...
Voice transformation refers to a class of techniques that modify the voice charac-teristics either t...
International audienceThis paper investigates the effect of a transfer function-based voice transfor...
Comunicació presentada a 9th Annual Conference of the International Speech Communication Association...
Comunicació presentada a 9th Annual Conference of the International Speech Communication Association...
Voice conversion – the methodology of automatically convert-ing one’s utterances to sound as if spok...
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based...
In this work, we compare the performance of human listeners and two well known speaker verification ...