@inproceedings{83f58edaf6a9449890260fd0793829cf,
title = "Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech",
abstract = "Voice conversion - the methodology of automatically converting one's utterances to sound as if spoken by another speaker - presents a threat for applications relying on speaker verification. We study vulnerability of text-independent speaker verification systems against voice conversion attacks using telephone speech. We implemented a voice conversion systems with two types of features and nonparallel frame alignment methods and five speaker verification systems ranging from simple Gaussian mixture models (GMMs) to state-of-the-art joint factor analysis (JFA) recognizer. Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks. But even it experiences more than 5-fold increase in the false acceptance rate from 3.24 \% to 17.33 \%.",
keywords = "security, speaker verification, voice conversion",
author = "Tomi Kinnunen and Wu, \{Zhi Zheng\} and Lee, \{Kong Aik\} and Filip Sedlak and Chng, \{Eng Siong\} and Haizhou Li",
year = "2012",
month = aug,
doi = "10.1109/ICASSP.2012.6288895",
language = "English",
isbn = "9781467300469",
series = "ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings",
pages = "4401--4404",
booktitle = "2012 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2012 - Proceedings",
note = "2012 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2012 ; Conference date: 25-03-2012 Through 30-03-2012",
}