Skip to main content

Testing Voice Mimicry with the YOHO Speaker Verification Corpus

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3684))

Abstract

The aim of this paper is to determine how vulnerable a speaker verification system is to conscious effort by impostors to mimic a client of the system. The paper explores systematically how much closer an impostor can get to another speaker’s voice by repeated attempts. Experiments on 138 speakers in the YOHO database and six people who played a role as imitators showed a fact that professional linguists could successfully attack the system. Non-professional people could have a good chance if they know their closest speaker in the database.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huang, X., Acero, A., Hon, H., Ju, Y., Liu, J., Meredith, S., Plumpe, M.: Recent Improvements on Microsoft.s Trainable Text-to-Speech System: Whistler. In: Proc. of the Int. Conf. on Acoustics, Speech, and Signal Processing, Munich, Germany (1997)

    Google Scholar 

  2. Lindberg, J., Blomberg, M.: Vulnerability in speaker verification. A study of technical impostor techniques. In: Proc of Eurospeech 1999, pp. 1211–1214 (1999)

    Google Scholar 

  3. Masuko, T., Tokuda, K., Kobayashi, T.: Impostors using Synthetic Speech Against Speaker Verification Based on Spectrum and Pitch. In: Proc. ICSLP 2000 (2000)

    Google Scholar 

  4. Pellom, B.L., Hansen, J.H.L.: An Experimental Study of Speaker Verification Sensitivity to Computer Voice-Altered Impostors. In: IEEE ICASSP 1999: Inter. Conf. on Acoustics, Speech, and Signal Processing, vol. 2, pp. 837–840 (1999)

    Google Scholar 

  5. Reynolds, D.A.: Speaker identification and verification using Gaussian mixture speaker models. Speech Communication 17, 91–108 (1995)

    Article  Google Scholar 

  6. Satoh, T., Masuko, T., Kobayashi, T., Tokuda, K.: A robust speaker verification system against imposture using an HMM-based speech synthesis. In: Proc. 7th European Conference on Speech Communication and Technology, EUROSPEECH, Denmark, vol. 2, pp. 759–762 (2001)

    Google Scholar 

  7. Takashi, M., Keiichi, T., Takao, K.: Imposture using synthetic speech against speaker verification based on spectrum and pitch. In: Proc. ICSLP 2000, vol. 2, pp. 302–305 (2000)

    Google Scholar 

  8. Tran, D., Wagner, M.: Fuzzy Gaussian Mixture Models for Speaker Recognition. Australian Journal of Intelligent Information Processing Systems (AJIIPS) 5(4), 293–300 (1998)

    Google Scholar 

  9. Woodland, P.C., et al.: Broadcast news transcription using HTK. In: Proceedings of ICASSP, USA (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lau, Y.W., Tran, D., Wagner, M. (2005). Testing Voice Mimicry with the YOHO Speaker Verification Corpus. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3684. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554028_3

Download citation

  • DOI: https://doi.org/10.1007/11554028_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28897-8

  • Online ISBN: 978-3-540-31997-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics