Nothing Special   »   [go: up one dir, main page]

APSIPA Transactions on Signal and Information Processing > Vol 3 > Issue 1

Voice conversion versus speaker verification: an overview

Zhizheng Wu, School of Computer Engineering, Nanyang Technological University AND Nanyang Technological University, zhizheng.wu@ed.ac.uk , Haizhou Li, School of Computer Engineering, Nanyang Technological University AND Singapore Institute for Infocomm Research
 
Suggested Citation
Zhizheng Wu and Haizhou Li (2014), "Voice conversion versus speaker verification: an overview", APSIPA Transactions on Signal and Information Processing: Vol. 3: No. 1, e17. http://dx.doi.org/10.1017/ATSIP.2014.17

Publication Date: 22 Dec 2014
© 2014 Zhizheng Wu and Haizhou Li
 
Subjects
 
Keywords
Speaker verificationVoice conversionSpoofing attackAnti-spoofingCountermeasureSecurity
 

Share

Open Access

This is published under the terms of the Creative Commons Attribution licence.

Downloaded: 2755 times

In this article:
I. INTRODUCTION 
II. VOICE CONVERSION TECHNIQUES 
III. SPEAKER VERIFICATION TECHNIQUES 
IV. SPOOFING ATTACK STUDIES 
V. ANTI-SPOOFING ATTACK STUDIES 
VI. SOFTWARES AND DATABASES 
VII. CONCLUSION 

Abstract

A speaker verification system automatically accepts or rejects a claimed identity of a speaker based on a speech sample. Recently, a major progress was made in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major concern when deploying speaker verification technology is whether a system is robust against spoofing attacks. Speaker verification studies provided us a good insight into speaker characterization, which has contributed to the progress of voice conversion technology. Unfortunately, voice conversion has become one of the most easily accessible techniques to carry out spoofing attacks; therefore, presents a threat to speaker verification systems. In this paper, we will briefly introduce the fundamentals of voice conversion and speaker verification technologies. We then give an overview of recent spoofing attack studies under different conditions with a focus on voice conversion spoofing attack. We will also discuss anti-spoofing attack measures for speaker verification.

DOI:10.1017/ATSIP.2014.17