Skip to main content

Application-Oriented Robustness Issues

  • Chapter
  • First Online:
Robustness-Related Issues in Speaker Recognition

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSSIGNAL))

  • 513 Accesses

Abstract

With the development of speaker recognition technologies, they have been used in wide application areas. The main applications of speaker recognition technologies include the followings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Reynolds DA (1995) Automatic speaker recognition using Gaussian mixture speaker models In: The Lincoln Laboratory Journal

    Google Scholar 

  2. Kinnunen T (2003) Spectral features for automatic text-independent speaker recognition. Licentiate‘s Thesis, University of Joensuu—2003

    Google Scholar 

  3. Reynolds D, Heck LP (2001) Speaker verification: from research to reality. In: Tutorial of International Conference on Acoustics, Speech, and Signal Processing

    Google Scholar 

  4. Rose P (2003) Forensic speaker identification. CRC Press

    Google Scholar 

  5. Kuhn R, Junqua JC, Nguyen P et al (2000) Rapid speaker adaptation in eigenvoice space. IEEE Trans Speech Audio Process 8(6):695–707

    Article  Google Scholar 

  6. Dunn RB, Reynolds DA, Quatieri TF (2000) Approaches to speaker detection and tracking in conversational speech. Digit Signal Proc 10(1–3):93–112

    Article  Google Scholar 

  7. Martin AF, Przybocki MA (2001) Speaker recognition in a multi-speaker environment. In: INTERSPEECH. pp 787–790

    Google Scholar 

  8. Jin Q (2007) Robust speaker recognition. Carnegie Mellon University

    Google Scholar 

  9. Larcher A, Lee KA, Ma B et al (2012) RSR2015: database for text-dependent speaker verification using multiple pass-phrases. In: INTERSPEECH. pp 1580–1583

    Google Scholar 

  10. Vogt R, Sridharan S, Mason M (2010) Making confident speaker verification decisions with minimal speech. IEEE Trans Audio Speech Lang Process 18(6):1182–1192

    Article  Google Scholar 

  11. Mak MW, Hsiao R, Mak B (2006) A comparison of various adaptation methods for speaker verification with limited enrollment data. In: Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, ICASSP 2006, vol 1. IEEE, p I-I

    Google Scholar 

  12. Li L, Wang D, Zhang C et al (2016) Improving short utterance speaker recognition by modeling speech unit classes. IEEE/ACM Trans Audio Speech Lang Process (TASLP) 24(6):1129-1139

    Google Scholar 

  13. Vogt RJ, Lustri CJ, Sridharan S (2008) Factor analysis modelling for speaker verification with short utterances

    Google Scholar 

  14. Kanagasundaram A, Vogt R, Dean DB et al (2011) I-vector based speaker recognition on short utterances. In: Proceedings of the 12th Annual Conference of the International Speech Communication Association. International Speech Communication Association (ISCA), pp 2341–2344

    Google Scholar 

  15. Nosratighods M, Ambikairajah E, Epps J et al (2010) A segment selection technique for speaker verification. Speech Commun 52(9):753–761

    Article  Google Scholar 

  16. Li L, Wang D, Zhang X et al (2016) System combination for short utterance speaker recognition. arXiv preprint arXiv:1603.09460

  17. Evans NWD, Kinnunen T, Yamagishi J (2013) Spoofing and countermeasures for automatic speaker verification. In: Interspeech. pp 925–929

    Google Scholar 

  18. Wu Z, Kinnunen T, Evans N et al (2015) ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. Training 10(15):3750

    Google Scholar 

  19. Kinnunen T, Evans N, Yamagishi J et al (2017) ASVspoof 2017: automatic speaker verification spoofing and countermeasures challenge evaluation plan. http://www.spoofingchallenge.org/

  20. Lau YW, Wagner M, Tran D (2004) Vulnerability of speaker verification to voice mimicking. In: Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004. IEEE, pp 145–148

    Google Scholar 

  21. Lau YW, Tran D, Wagner M (2005) Testing voice mimicry with the YOHO speaker verification corpus. In: International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer, Berlin, Heidelberg, pp 15–21

    Google Scholar 

  22. Lindberg J, Blomberg M (1999) Vulnerability in speaker verification-a study of technical impostor techniques. In: Eurospeech 99:1211–1214

    Google Scholar 

  23. Masuko T, Hitotsumatsu T, Tokuda K et al (1999) On the security of HMM-based speaker verification systems against imposture using synthetic speech. In: Eurospeech

    Google Scholar 

  24. Matsui T, Furui S (1995) Likelihood normalization for speaker verification using a phoneme-and speaker-independent model. Speech Commun 17(1):109–116

    Article  Google Scholar 

  25. Masuko T, Tokuda K, Kobayashi T et al (1996) Speech synthesis using HMMs with dynamic features. In: 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 1996, vol 1. IEEE, pp 389–392

    Google Scholar 

  26. Masuko T, Tokuda K, Kobayashi T et al (1997) Voice characteristics conversion for HMM-based speech synthesis system. In: 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1997, ICASSP 1997, vol 3. IEEE, pp 1611–1614

    Google Scholar 

  27. Satoh T, Masuko T, Kobayashi T et al (2001) A robust speaker verification system against imposture using an HMM-based speech synthesis system. In: INTERSPEECH. pp 759–762

    Google Scholar 

  28. Chen LW, Guo W, Dai LR (2010) Speaker verification against synthetic speech. In: 2010 7th International Symposium on Chinese Spoken Language Processing (ISCSLP). IEEE, pp 309–312

    Google Scholar 

  29. De Leon PL, Pucher M, Yamagishi J et al (2012) Evaluation of speaker verification security and detection of HMM-based synthetic speech. IEEE Trans Audio Speech Lang Process 20(8):2280–2290

    Article  Google Scholar 

  30. Wu Z, Siong CE, Li H (2012) Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition. In: INTERSPEECH. pp 1700–1703

    Google Scholar 

  31. Ogihara A, Hitoshi U, Shiozaki A (2005) Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification. IEICE Trans Fundam Electron Commun Comput Sci 88(1):280–286

    Article  Google Scholar 

  32. De Leon PL, Stewart B, Yamagishi J (2012) Synthetic speech discrimination using pitch pattern statistics derived from Image analysis. In: INTERSPEECH. pp 370–373

    Google Scholar 

  33. Stylianou Y (2009) Voice transformation: a survey. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2009, ICASSP 2009. IEEE, pp 3585–3588

    Google Scholar 

  34. Pellom BL, Hansen JHL (1999) An experimental study of speaker verification sensitivity to computer voice-altered imposters. In: Proceedings of the 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1999, vol 2. IEEE, pp 837–840

    Google Scholar 

  35. Matrouf D, Bonastre JF, Fredouille C (2006) Effect of speech transformation on impostor acceptance. In: Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, ICASSP 2006, vol 1. IEEE, p I-I

    Google Scholar 

  36. Alegre F, Vipperla R, Evans N (2012) Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals. In: 13th Annual Conference of the International Speech Communication Association, INTERSPEECH 2012

    Google Scholar 

  37. Alegre F, Amehraye A, Evans N (2013) Spoofing countermeasures to protect automatic speaker verification from voice conversion. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 3068–3072

    Google Scholar 

  38. Lindberg J, Blomberg M (1999) Vulnerability in speaker verification-a study of technical impostor techniques. In: Eurospeech, vol 99. pp 1211–1214

    Google Scholar 

  39. Kinnunen T, Sahidullah M, Falcone M et al (2017) RedDots replayed: a new replay spoofing attack corpus for text-dependent speaker verification research. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing

    Google Scholar 

  40. Villalba J, Lleida E (2010) Speaker verification performance degradation against spoofing and tampering attacks. In: FALA workshop. pp 131–134

    Google Scholar 

  41. Villalba J, Lleida E (2011) Preventing replay attacks on speaker verification systems. In: 2011 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, pp 1–8

    Google Scholar 

  42. Alegre F, Janicki A, Evans N (2014) Re-assessing the threat of replay spoofing attacks against automatic speaker verification. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, pp 1–6

    Google Scholar 

  43. Wu Z, Gao S, Cling ES et al (2014) A study on replay attack and anti-spoofing for text-dependent speaker verification. In: 2014 Annual Summit and Conference on Asia-Pacific Signal and Information Processing Association (APSIPA). IEEE, pp 1–5

    Google Scholar 

  44. Villalba J, Lleida E (2011) Detecting replay attacks from far-field recordings on speaker verification systems. In: European Workshop on Biometrics and Identity Management. Springer, Berlin, Heidelberg, pp 274–285

    Google Scholar 

  45. Shiota S, Villavicencio F, Yamagishi J et al (2015) Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. In: INTERSPEECH. pp 239–243

    Google Scholar 

  46. Shiota S, Villavicencio F, Yamagishi J et al (2016) Voice liveness detection for speaker verification based on a tandem single/double-channel pop noise detector. Odyssey 2016:259–263

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Zheng, T.F., Li, L. (2017). Application-Oriented Robustness Issues. In: Robustness-Related Issues in Speaker Recognition. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-3238-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3238-7_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3237-0

  • Online ISBN: 978-981-10-3238-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics