Skip to main content

2017 | OriginalPaper | Buchkapitel

4. Application-Oriented Robustness Issues

verfasst von : Thomas Fang Zheng, Lantian Li

Erschienen in: Robustness-Related Issues in Speaker Recognition

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the development of speaker recognition technologies, they have been used in wide application areas. The main applications of speaker recognition technologies include the followings.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Reynolds DA (1995) Automatic speaker recognition using Gaussian mixture speaker models In: The Lincoln Laboratory Journal Reynolds DA (1995) Automatic speaker recognition using Gaussian mixture speaker models In: The Lincoln Laboratory Journal
2.
Zurück zum Zitat Kinnunen T (2003) Spectral features for automatic text-independent speaker recognition. Licentiate‘s Thesis, University of Joensuu—2003 Kinnunen T (2003) Spectral features for automatic text-independent speaker recognition. Licentiate‘s Thesis, University of Joensuu—2003
3.
Zurück zum Zitat Reynolds D, Heck LP (2001) Speaker verification: from research to reality. In: Tutorial of International Conference on Acoustics, Speech, and Signal Processing Reynolds D, Heck LP (2001) Speaker verification: from research to reality. In: Tutorial of International Conference on Acoustics, Speech, and Signal Processing
4.
Zurück zum Zitat Rose P (2003) Forensic speaker identification. CRC Press Rose P (2003) Forensic speaker identification. CRC Press
5.
Zurück zum Zitat Kuhn R, Junqua JC, Nguyen P et al (2000) Rapid speaker adaptation in eigenvoice space. IEEE Trans Speech Audio Process 8(6):695–707CrossRef Kuhn R, Junqua JC, Nguyen P et al (2000) Rapid speaker adaptation in eigenvoice space. IEEE Trans Speech Audio Process 8(6):695–707CrossRef
6.
Zurück zum Zitat Dunn RB, Reynolds DA, Quatieri TF (2000) Approaches to speaker detection and tracking in conversational speech. Digit Signal Proc 10(1–3):93–112CrossRef Dunn RB, Reynolds DA, Quatieri TF (2000) Approaches to speaker detection and tracking in conversational speech. Digit Signal Proc 10(1–3):93–112CrossRef
7.
Zurück zum Zitat Martin AF, Przybocki MA (2001) Speaker recognition in a multi-speaker environment. In: INTERSPEECH. pp 787–790 Martin AF, Przybocki MA (2001) Speaker recognition in a multi-speaker environment. In: INTERSPEECH. pp 787–790
8.
Zurück zum Zitat Jin Q (2007) Robust speaker recognition. Carnegie Mellon University Jin Q (2007) Robust speaker recognition. Carnegie Mellon University
9.
Zurück zum Zitat Larcher A, Lee KA, Ma B et al (2012) RSR2015: database for text-dependent speaker verification using multiple pass-phrases. In: INTERSPEECH. pp 1580–1583 Larcher A, Lee KA, Ma B et al (2012) RSR2015: database for text-dependent speaker verification using multiple pass-phrases. In: INTERSPEECH. pp 1580–1583
10.
Zurück zum Zitat Vogt R, Sridharan S, Mason M (2010) Making confident speaker verification decisions with minimal speech. IEEE Trans Audio Speech Lang Process 18(6):1182–1192CrossRef Vogt R, Sridharan S, Mason M (2010) Making confident speaker verification decisions with minimal speech. IEEE Trans Audio Speech Lang Process 18(6):1182–1192CrossRef
11.
Zurück zum Zitat Mak MW, Hsiao R, Mak B (2006) A comparison of various adaptation methods for speaker verification with limited enrollment data. In: Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, ICASSP 2006, vol 1. IEEE, p I-I Mak MW, Hsiao R, Mak B (2006) A comparison of various adaptation methods for speaker verification with limited enrollment data. In: Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, ICASSP 2006, vol 1. IEEE, p I-I
12.
Zurück zum Zitat Li L, Wang D, Zhang C et al (2016) Improving short utterance speaker recognition by modeling speech unit classes. IEEE/ACM Trans Audio Speech Lang Process (TASLP) 24(6):1129-1139 Li L, Wang D, Zhang C et al (2016) Improving short utterance speaker recognition by modeling speech unit classes. IEEE/ACM Trans Audio Speech Lang Process (TASLP) 24(6):1129-1139
13.
Zurück zum Zitat Vogt RJ, Lustri CJ, Sridharan S (2008) Factor analysis modelling for speaker verification with short utterances Vogt RJ, Lustri CJ, Sridharan S (2008) Factor analysis modelling for speaker verification with short utterances
14.
Zurück zum Zitat Kanagasundaram A, Vogt R, Dean DB et al (2011) I-vector based speaker recognition on short utterances. In: Proceedings of the 12th Annual Conference of the International Speech Communication Association. International Speech Communication Association (ISCA), pp 2341–2344 Kanagasundaram A, Vogt R, Dean DB et al (2011) I-vector based speaker recognition on short utterances. In: Proceedings of the 12th Annual Conference of the International Speech Communication Association. International Speech Communication Association (ISCA), pp 2341–2344
15.
Zurück zum Zitat Nosratighods M, Ambikairajah E, Epps J et al (2010) A segment selection technique for speaker verification. Speech Commun 52(9):753–761CrossRef Nosratighods M, Ambikairajah E, Epps J et al (2010) A segment selection technique for speaker verification. Speech Commun 52(9):753–761CrossRef
16.
17.
Zurück zum Zitat Evans NWD, Kinnunen T, Yamagishi J (2013) Spoofing and countermeasures for automatic speaker verification. In: Interspeech. pp 925–929 Evans NWD, Kinnunen T, Yamagishi J (2013) Spoofing and countermeasures for automatic speaker verification. In: Interspeech. pp 925–929
18.
Zurück zum Zitat Wu Z, Kinnunen T, Evans N et al (2015) ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. Training 10(15):3750 Wu Z, Kinnunen T, Evans N et al (2015) ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. Training 10(15):3750
20.
Zurück zum Zitat Lau YW, Wagner M, Tran D (2004) Vulnerability of speaker verification to voice mimicking. In: Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004. IEEE, pp 145–148 Lau YW, Wagner M, Tran D (2004) Vulnerability of speaker verification to voice mimicking. In: Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004. IEEE, pp 145–148
21.
Zurück zum Zitat Lau YW, Tran D, Wagner M (2005) Testing voice mimicry with the YOHO speaker verification corpus. In: International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer, Berlin, Heidelberg, pp 15–21 Lau YW, Tran D, Wagner M (2005) Testing voice mimicry with the YOHO speaker verification corpus. In: International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer, Berlin, Heidelberg, pp 15–21
22.
Zurück zum Zitat Lindberg J, Blomberg M (1999) Vulnerability in speaker verification-a study of technical impostor techniques. In: Eurospeech 99:1211–1214 Lindberg J, Blomberg M (1999) Vulnerability in speaker verification-a study of technical impostor techniques. In: Eurospeech 99:1211–1214
23.
Zurück zum Zitat Masuko T, Hitotsumatsu T, Tokuda K et al (1999) On the security of HMM-based speaker verification systems against imposture using synthetic speech. In: Eurospeech Masuko T, Hitotsumatsu T, Tokuda K et al (1999) On the security of HMM-based speaker verification systems against imposture using synthetic speech. In: Eurospeech
24.
Zurück zum Zitat Matsui T, Furui S (1995) Likelihood normalization for speaker verification using a phoneme-and speaker-independent model. Speech Commun 17(1):109–116CrossRef Matsui T, Furui S (1995) Likelihood normalization for speaker verification using a phoneme-and speaker-independent model. Speech Commun 17(1):109–116CrossRef
25.
Zurück zum Zitat Masuko T, Tokuda K, Kobayashi T et al (1996) Speech synthesis using HMMs with dynamic features. In: 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 1996, vol 1. IEEE, pp 389–392 Masuko T, Tokuda K, Kobayashi T et al (1996) Speech synthesis using HMMs with dynamic features. In: 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 1996, vol 1. IEEE, pp 389–392
26.
Zurück zum Zitat Masuko T, Tokuda K, Kobayashi T et al (1997) Voice characteristics conversion for HMM-based speech synthesis system. In: 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1997, ICASSP 1997, vol 3. IEEE, pp 1611–1614 Masuko T, Tokuda K, Kobayashi T et al (1997) Voice characteristics conversion for HMM-based speech synthesis system. In: 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1997, ICASSP 1997, vol 3. IEEE, pp 1611–1614
27.
Zurück zum Zitat Satoh T, Masuko T, Kobayashi T et al (2001) A robust speaker verification system against imposture using an HMM-based speech synthesis system. In: INTERSPEECH. pp 759–762 Satoh T, Masuko T, Kobayashi T et al (2001) A robust speaker verification system against imposture using an HMM-based speech synthesis system. In: INTERSPEECH. pp 759–762
28.
Zurück zum Zitat Chen LW, Guo W, Dai LR (2010) Speaker verification against synthetic speech. In: 2010 7th International Symposium on Chinese Spoken Language Processing (ISCSLP). IEEE, pp 309–312 Chen LW, Guo W, Dai LR (2010) Speaker verification against synthetic speech. In: 2010 7th International Symposium on Chinese Spoken Language Processing (ISCSLP). IEEE, pp 309–312
29.
Zurück zum Zitat De Leon PL, Pucher M, Yamagishi J et al (2012) Evaluation of speaker verification security and detection of HMM-based synthetic speech. IEEE Trans Audio Speech Lang Process 20(8):2280–2290CrossRef De Leon PL, Pucher M, Yamagishi J et al (2012) Evaluation of speaker verification security and detection of HMM-based synthetic speech. IEEE Trans Audio Speech Lang Process 20(8):2280–2290CrossRef
30.
Zurück zum Zitat Wu Z, Siong CE, Li H (2012) Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition. In: INTERSPEECH. pp 1700–1703 Wu Z, Siong CE, Li H (2012) Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition. In: INTERSPEECH. pp 1700–1703
31.
Zurück zum Zitat Ogihara A, Hitoshi U, Shiozaki A (2005) Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification. IEICE Trans Fundam Electron Commun Comput Sci 88(1):280–286CrossRef Ogihara A, Hitoshi U, Shiozaki A (2005) Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification. IEICE Trans Fundam Electron Commun Comput Sci 88(1):280–286CrossRef
32.
Zurück zum Zitat De Leon PL, Stewart B, Yamagishi J (2012) Synthetic speech discrimination using pitch pattern statistics derived from Image analysis. In: INTERSPEECH. pp 370–373 De Leon PL, Stewart B, Yamagishi J (2012) Synthetic speech discrimination using pitch pattern statistics derived from Image analysis. In: INTERSPEECH. pp 370–373
33.
Zurück zum Zitat Stylianou Y (2009) Voice transformation: a survey. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2009, ICASSP 2009. IEEE, pp 3585–3588 Stylianou Y (2009) Voice transformation: a survey. In: IEEE International Conference on Acoustics, Speech and Signal Processing, 2009, ICASSP 2009. IEEE, pp 3585–3588
34.
Zurück zum Zitat Pellom BL, Hansen JHL (1999) An experimental study of speaker verification sensitivity to computer voice-altered imposters. In: Proceedings of the 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1999, vol 2. IEEE, pp 837–840 Pellom BL, Hansen JHL (1999) An experimental study of speaker verification sensitivity to computer voice-altered imposters. In: Proceedings of the 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1999, vol 2. IEEE, pp 837–840
35.
Zurück zum Zitat Matrouf D, Bonastre JF, Fredouille C (2006) Effect of speech transformation on impostor acceptance. In: Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, ICASSP 2006, vol 1. IEEE, p I-I Matrouf D, Bonastre JF, Fredouille C (2006) Effect of speech transformation on impostor acceptance. In: Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, ICASSP 2006, vol 1. IEEE, p I-I
36.
Zurück zum Zitat Alegre F, Vipperla R, Evans N (2012) Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals. In: 13th Annual Conference of the International Speech Communication Association, INTERSPEECH 2012 Alegre F, Vipperla R, Evans N (2012) Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals. In: 13th Annual Conference of the International Speech Communication Association, INTERSPEECH 2012
37.
Zurück zum Zitat Alegre F, Amehraye A, Evans N (2013) Spoofing countermeasures to protect automatic speaker verification from voice conversion. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 3068–3072 Alegre F, Amehraye A, Evans N (2013) Spoofing countermeasures to protect automatic speaker verification from voice conversion. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 3068–3072
38.
Zurück zum Zitat Lindberg J, Blomberg M (1999) Vulnerability in speaker verification-a study of technical impostor techniques. In: Eurospeech, vol 99. pp 1211–1214 Lindberg J, Blomberg M (1999) Vulnerability in speaker verification-a study of technical impostor techniques. In: Eurospeech, vol 99. pp 1211–1214
39.
Zurück zum Zitat Kinnunen T, Sahidullah M, Falcone M et al (2017) RedDots replayed: a new replay spoofing attack corpus for text-dependent speaker verification research. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing Kinnunen T, Sahidullah M, Falcone M et al (2017) RedDots replayed: a new replay spoofing attack corpus for text-dependent speaker verification research. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing
40.
Zurück zum Zitat Villalba J, Lleida E (2010) Speaker verification performance degradation against spoofing and tampering attacks. In: FALA workshop. pp 131–134 Villalba J, Lleida E (2010) Speaker verification performance degradation against spoofing and tampering attacks. In: FALA workshop. pp 131–134
41.
Zurück zum Zitat Villalba J, Lleida E (2011) Preventing replay attacks on speaker verification systems. In: 2011 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, pp 1–8 Villalba J, Lleida E (2011) Preventing replay attacks on speaker verification systems. In: 2011 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, pp 1–8
42.
Zurück zum Zitat Alegre F, Janicki A, Evans N (2014) Re-assessing the threat of replay spoofing attacks against automatic speaker verification. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, pp 1–6 Alegre F, Janicki A, Evans N (2014) Re-assessing the threat of replay spoofing attacks against automatic speaker verification. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, pp 1–6
43.
Zurück zum Zitat Wu Z, Gao S, Cling ES et al (2014) A study on replay attack and anti-spoofing for text-dependent speaker verification. In: 2014 Annual Summit and Conference on Asia-Pacific Signal and Information Processing Association (APSIPA). IEEE, pp 1–5 Wu Z, Gao S, Cling ES et al (2014) A study on replay attack and anti-spoofing for text-dependent speaker verification. In: 2014 Annual Summit and Conference on Asia-Pacific Signal and Information Processing Association (APSIPA). IEEE, pp 1–5
44.
Zurück zum Zitat Villalba J, Lleida E (2011) Detecting replay attacks from far-field recordings on speaker verification systems. In: European Workshop on Biometrics and Identity Management. Springer, Berlin, Heidelberg, pp 274–285 Villalba J, Lleida E (2011) Detecting replay attacks from far-field recordings on speaker verification systems. In: European Workshop on Biometrics and Identity Management. Springer, Berlin, Heidelberg, pp 274–285
45.
Zurück zum Zitat Shiota S, Villavicencio F, Yamagishi J et al (2015) Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. In: INTERSPEECH. pp 239–243 Shiota S, Villavicencio F, Yamagishi J et al (2015) Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. In: INTERSPEECH. pp 239–243
46.
Zurück zum Zitat Shiota S, Villavicencio F, Yamagishi J et al (2016) Voice liveness detection for speaker verification based on a tandem single/double-channel pop noise detector. Odyssey 2016:259–263CrossRef Shiota S, Villavicencio F, Yamagishi J et al (2016) Voice liveness detection for speaker verification based on a tandem single/double-channel pop noise detector. Odyssey 2016:259–263CrossRef
Metadaten
Titel
Application-Oriented Robustness Issues
verfasst von
Thomas Fang Zheng
Lantian Li
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3238-7_4

Neuer Inhalt