Abstract
With the development of speaker recognition technologies, they have been used in wide application areas. The main applications of speaker recognition technologies include the followings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Reynolds DA (1995) Automatic speaker recognition using Gaussian mixture speaker models In: The Lincoln Laboratory Journal
Kinnunen T (2003) Spectral features for automatic text-independent speaker recognition. Licentiate‘s Thesis, University of Joensuu—2003
Reynolds D, Heck LP (2001) Speaker verification: from research to reality. In: Tutorial of International Conference on Acoustics, Speech, and Signal Processing
Rose P (2003) Forensic speaker identification. CRC Press
Kuhn R, Junqua JC, Nguyen P et al (2000) Rapid speaker adaptation in eigenvoice space. IEEE Trans Speech Audio Process 8(6):695–707
Dunn RB, Reynolds DA, Quatieri TF (2000) Approaches to speaker detection and tracking in conversational speech. Digit Signal Proc 10(1–3):93–112
Martin AF, Przybocki MA (2001) Speaker recognition in a multi-speaker environment. In: INTERSPEECH. pp 787–790
Jin Q (2007) Robust speaker recognition. Carnegie Mellon University
Larcher A, Lee KA, Ma B et al (2012) RSR2015: database for text-dependent speaker verification using multiple pass-phrases. In: INTERSPEECH. pp 1580–1583
Vogt R, Sridharan S, Mason M (2010) Making confident speaker verification decisions with minimal speech. IEEE Trans Audio Speech Lang Process 18(6):1182–1192
Mak MW, Hsiao R, Mak B (2006) A comparison of various adaptation methods for speaker verification with limited enrollment data. In: Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, ICASSP 2006, vol 1. IEEE, p I-I
Li L, Wang D, Zhang C et al (2016) Improving short utterance speaker recognition by modeling speech unit classes. IEEE/ACM Trans Audio Speech Lang Process (TASLP) 24(6):1129-1139
Vogt RJ, Lustri CJ, Sridharan S (2008) Factor analysis modelling for speaker verification with short utterances
Kanagasundaram A, Vogt R, Dean DB et al (2011) I-vector based speaker recognition on short utterances. In: Proceedings of the 12th Annual Conference of the International Speech Communication Association. International Speech Communication Association (ISCA), pp 2341–2344
Nosratighods M, Ambikairajah E, Epps J et al (2010) A segment selection technique for speaker verification. Speech Commun 52(9):753–761
Li L, Wang D, Zhang X et al (2016) System combination for short utterance speaker recognition. arXiv preprint arXiv:1603.09460
Evans NWD, Kinnunen T, Yamagishi J (2013) Spoofing and countermeasures for automatic speaker verification. In: Interspeech. pp 925–929
Wu Z, Kinnunen T, Evans N et al (2015) ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. Training 10(15):3750
Kinnunen T, Evans N, Yamagishi J et al (2017) ASVspoof 2017: automatic speaker verification spoofing and countermeasures challenge evaluation plan. http://www.spoofingchallenge.org/
Lau YW, Wagner M, Tran D (2004) Vulnerability of speaker verification to voice mimicking. In: Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004. IEEE, pp 145–148
Lau YW, Tran D, Wagner M (2005) Testing voice mimicry with the YOHO speaker verification corpus. In: International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer, Berlin, Heidelberg, pp 15–21
Lindberg J, Blomberg M (1999) Vulnerability in speaker verification-a study of technical impostor techniques. In: Eurospeech 99:1211–1214
Masuko T, Hitotsumatsu T, Tokuda K et al (1999) On the security of HMM-based speaker verification systems against imposture using synthetic speech. In: Eurospeech
Matsui T, Furui S (1995) Likelihood normalization for speaker verification using a phoneme-and speaker-independent model. Speech Commun 17(1):109–116
Masuko T, Tokuda K, Kobayashi T et al (1996) Speech synthesis using HMMs with dynamic features. In: 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 1996, vol 1. IEEE, pp 389–392
Masuko T, Tokuda K, Kobayashi T et al (1997) Voice characteristics conversion for HMM-based speech synthesis system. In: 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1997, ICASSP 1997, vol 3. IEEE, pp 1611–1614
Satoh T, Masuko T, Kobayashi T et al (2001) A robust speaker verification system against imposture using an HMM-based speech synthesis system. In: INTERSPEECH. pp 759–762
Chen LW, Guo W, Dai LR (2010) Speaker verification against synthetic speech. In: 2010 7th International Symposium on Chinese Spoken Language Processing (ISCSLP). IEEE, pp 309–312
De Leon PL, Pucher M, Yamagishi J et al (2012) Evaluation of speaker verification security and detection of HMM-based synthetic speech. IEEE Trans Audio Speech Lang Process 20(8):2280–2290
Wu Z, Siong CE, Li H (2012) Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition. In: INTERSPEECH. pp 1700–1703
Ogihara A, Hitoshi U, Shiozaki A (2005) Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification. IEICE Trans Fundam Electron Commun Comput Sci 88(1):280–286
De Leon PL, Stewart B, Yamagishi J (2012) Synthetic speech discrimination using pitch pattern statistics derived from Image analysis. In: INTERSPEECH. pp 370–373
Stylianou Y (2009) Voice transformation: a survey. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2009, ICASSP 2009. IEEE, pp 3585–3588
Pellom BL, Hansen JHL (1999) An experimental study of speaker verification sensitivity to computer voice-altered imposters. In: Proceedings of the 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1999, vol 2. IEEE, pp 837–840
Matrouf D, Bonastre JF, Fredouille C (2006) Effect of speech transformation on impostor acceptance. In: Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, ICASSP 2006, vol 1. IEEE, p I-I
Alegre F, Vipperla R, Evans N (2012) Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals. In: 13th Annual Conference of the International Speech Communication Association, INTERSPEECH 2012
Alegre F, Amehraye A, Evans N (2013) Spoofing countermeasures to protect automatic speaker verification from voice conversion. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 3068–3072
Lindberg J, Blomberg M (1999) Vulnerability in speaker verification-a study of technical impostor techniques. In: Eurospeech, vol 99. pp 1211–1214
Kinnunen T, Sahidullah M, Falcone M et al (2017) RedDots replayed: a new replay spoofing attack corpus for text-dependent speaker verification research. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing
Villalba J, Lleida E (2010) Speaker verification performance degradation against spoofing and tampering attacks. In: FALA workshop. pp 131–134
Villalba J, Lleida E (2011) Preventing replay attacks on speaker verification systems. In: 2011 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, pp 1–8
Alegre F, Janicki A, Evans N (2014) Re-assessing the threat of replay spoofing attacks against automatic speaker verification. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, pp 1–6
Wu Z, Gao S, Cling ES et al (2014) A study on replay attack and anti-spoofing for text-dependent speaker verification. In: 2014 Annual Summit and Conference on Asia-Pacific Signal and Information Processing Association (APSIPA). IEEE, pp 1–5
Villalba J, Lleida E (2011) Detecting replay attacks from far-field recordings on speaker verification systems. In: European Workshop on Biometrics and Identity Management. Springer, Berlin, Heidelberg, pp 274–285
Shiota S, Villavicencio F, Yamagishi J et al (2015) Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. In: INTERSPEECH. pp 239–243
Shiota S, Villavicencio F, Yamagishi J et al (2016) Voice liveness detection for speaker verification based on a tandem single/double-channel pop noise detector. Odyssey 2016:259–263
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Zheng, T.F., Li, L. (2017). Application-Oriented Robustness Issues. In: Robustness-Related Issues in Speaker Recognition. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-3238-7_4
Download citation
DOI: https://doi.org/10.1007/978-981-10-3238-7_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3237-0
Online ISBN: 978-981-10-3238-7
eBook Packages: EngineeringEngineering (R0)