2014
DOI: 10.1017/atsip.2014.17
|View full text |Cite
|
Sign up to set email alerts
|

Voice conversion versus speaker verification: an overview

Abstract: A speaker verification system automatically accepts or rejects a claimed identity of a speaker based on a speech sample. Recently, a major progress was made in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major concern when deploying speaker verification technology is whether a system is robust against spoofing attacks. Speaker verification studies provided us a good insight into speaker characterization, which has contributed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 41 publications
(35 citation statements)
references
References 98 publications
(98 reference statements)
0
34
0
1
Order By: Relevance
“…(a) Split a sentence for parallel conversion (b) Logistic function for segment merging. subsequent steps such as the estimation of GMM parameters in equation (8). For example, in the work of Wojciech Kwedlo [47], a shared memory parallelization of the standard EM algorithm based on data decomposition is proposed to learn the GMM parameters on a multi-core system for higher performance.…”
Section: A) Multi-core Parallel Computingmentioning
confidence: 99%
“…(a) Split a sentence for parallel conversion (b) Logistic function for segment merging. subsequent steps such as the estimation of GMM parameters in equation (8). For example, in the work of Wojciech Kwedlo [47], a shared memory parallelization of the standard EM algorithm based on data decomposition is proposed to learn the GMM parameters on a multi-core system for higher performance.…”
Section: A) Multi-core Parallel Computingmentioning
confidence: 99%
“…The eigenvoice GMM (EV-GMM) was constructed from the training data from one pivot speaker in the ATR Japanese speech database [35], and 273 speakers (137 male, 136 female) from the JNAS database. 4 Settings were the same as in [36]. The 272-dimensional weight vectors were estimated by using 4 http://www.milab.is.tsukuba.ac.jp/jnas/instruct.html the Part-A (small) training data.…”
Section: Ss-largementioning
confidence: 99%
“…4 Settings were the same as in [36]. The 272-dimensional weight vectors were estimated by using 4 http://www.milab.is.tsukuba.ac.jp/jnas/instruct.html the Part-A (small) training data. Covariance matrices in EV-GMM were not updated, i.e.…”
Section: Ss-largementioning
confidence: 99%
See 1 more Smart Citation
“…As discussed in [50], feature extraction in speaker verification is one of the weak links. In a replay attack, an attacker plays a pre-recorded speech from the exact target speaker to spoof a text-dependent speaker verification system.…”
Section: Vulnerability Of Speaker Verification To Attacksmentioning
confidence: 99%