منابع مشابه
Anti-spoofing Methods for Automatic Speaker Verification System
Growing interest in automatic speaker verification (ASV) systems has lead to significant quality improvement of spoofing attacks on them. Many research works confirm that despite the low equal error rate (EER) ASV systems are still vulnerable to spoofing attacks. In this work we overview different acoustic feature spaces and classifiers to determine reliable and robust countermeasures against s...
متن کاملDiscriminating semi-continuous HMM for speaker verification
This paper describes the use of a multiple codebook SCHMM speaker verification system, which uses a novel technique for discriminative hidden Markov modelling known as discriminative observation probabilities (DOP). DOP can easily be added to a multiple codebook HMM system and require minimal additional computation and no additional training. The DOP technique can be applied to both speech and ...
متن کاملDeep Speaker Vectors for Semi Text-independent Speaker Verification
Recent research shows that deep neural networks (DNNs) can be used to extract deep speaker vectors (d-vectors) that preserve speaker characteristics and can be used in speaker verification. This new method has been tested on text-dependent speaker verification tasks, and improvement was reported when combined with the conventional i-vector method. This paper extends the d-vector approach to sem...
متن کاملSegmental Approaches for Automatic Speaker Verification
Segmental Approaches for Automatic Speaker Verification Dijana Petrovska-Delacrétaz∗,1, Jan Černocký†, Jean Hennebert‡, and Gérard Chollet§ ∗Circuits and Systems Laboratory, Swiss Federal Institute of Technology, DE-CIRC, 1015 Lausanne, Switzerland; †Institute of Radio-electronics, Brno University of Technology, Czech Republic; ‡UpperSide Consulting, 52 Chaussée de Vleurgat, 1050 Brussels, Belg...
متن کاملSpoofing and countermeasures for automatic speaker verification
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific and Technical Journal of Information Technologies, Mechanics and Optics
سال: 2016
ISSN: 2226-1494
DOI: 10.17586/2226-1494-2016-16-2-284-289