Login / Signup
Vulnerability in speaker verification - a study of technical impostor techniques.
Johan Lindberg
Mats Blomberg
Published in:
EUROSPEECH (1999)
Keyphrases
</>
speaker verification
neural network
high dimensional
information retrieval
genetic algorithm
support vector machine
noisy environments
speaker recognition