Login / Signup
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech.
Tomi Kinnunen
Zhizheng Wu
Kong-Aik Lee
Filip Sedlak
Engsiong Chng
Haizhou Li
Published in:
ICASSP (2012)
Keyphrases
</>
speaker verification
prosodic features
emotion recognition
noisy environments
speaker recognition
audio visual
biometric systems
acoustic features
detection method
face verification
text to speech
speech synthesis
pattern recognition
text classification
multilayer perceptron
speech signal