ISCA Archive Eurospeech 1999
ISCA Archive Eurospeech 1999

Vulnerability in speaker verification - a study of technical impostor techniques

Johan Lindberg, Mats Blomberg

This paper reports on some ways to try to deceive a state-of-the-art speaker verification (SV) system. In order to evaluate the risk in SV systems one has to take into account the possible intentional impostors who know whom they are attacking. We defined a worst case scenario where the impostor has extensive knowledge about the person to deceive as well as the system to attack. In this framework we tested our SV system against concatenated client speech, re-synthesis of the client speech and diphone synthesis of the client.


doi: 10.21437/Eurospeech.1999-283

Cite as: Lindberg, J., Blomberg, M. (1999) Vulnerability in speaker verification - a study of technical impostor techniques. Proc. 6th European Conference on Speech Communication and Technology (Eurospeech 1999), 1211-1214, doi: 10.21437/Eurospeech.1999-283

@inproceedings{lindberg99_eurospeech,
  author={Johan Lindberg and Mats Blomberg},
  title={{Vulnerability in speaker verification - a study of technical impostor techniques}},
  year=1999,
  booktitle={Proc. 6th European Conference on Speech Communication and Technology (Eurospeech 1999)},
  pages={1211--1214},
  doi={10.21437/Eurospeech.1999-283}
}