Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection.
Tomi KinnunenRosa González HautamäkiVille VestmanMd. SahidullahPublished in: CoRR (2018)
Keyphrases
- speaker recognition
- gaussian mixture model
- countermeasures
- speaker verification
- vector quantization
- speaker identification
- probabilistic neural network
- speech signal
- speech recognition
- ddos attacks
- mel frequency cepstral coefficients
- mixture model
- video sequences
- multiscale
- feature extraction
- image segmentation
- multimedia