{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T23:44:18Z","timestamp":1746229458699,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030299583"},{"type":"electronic","value":"9783030299590"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29959-0_23","type":"book-chapter","created":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T23:04:10Z","timestamp":1568502250000},"page":"471-492","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Attacking Speaker Recognition Systems with Phoneme Morphing"],"prefix":"10.1007","author":[{"given":"Henry","family":"Turner","sequence":"first","affiliation":[]},{"given":"Giulio","family":"Lovisotto","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Martinovic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,15]]},"reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-319-15618-7_5","volume-title":"Engineering Secure Software and Systems","author":"K Allix","year":"2015","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y.: Are your training datasets yet relevant? In: Piessens, F., Caballero, J., Bielova, N. (eds.) ESSoS 2015. LNCS, vol. 8978, pp. 51\u201367. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15618-7_5"},{"unstructured":"Apple Siri Team: Personalized Hey Siri - Apple (2018). https:\/\/machinelearning.apple.com\/2018\/04\/16\/personalized-hey-siri.html. Accessed 7 Jul 2019","key":"23_CR2"},{"issue":"4","key":"23_CR3","doi-asserted-by":"publisher","first-page":"101962","DOI":"10.1155\/S1110865704310024","volume":"2004","author":"F Bimbot","year":"2004","unstructured":"Bimbot, F., et al.: A tutorial on text-independent speaker verification. EURASIP J. Adv. Signal Process. 2004(4), 101962 (2004)","journal-title":"EURASIP J. Adv. Signal Process."},{"doi-asserted-by":"crossref","unstructured":"Blue, L., Abdullah, H., Vargas, L., Traynor, P.: 2MA: verifying voice commands via two microphone authentication. In: Proceedings of the 13th on Asia Conference on Computer and Communications Security, pp. 89\u2013100. ACM (2018)","key":"23_CR4","DOI":"10.1145\/3196494.3196545"},{"doi-asserted-by":"crossref","unstructured":"Blue, L., Vargas, L., Traynor, P.: Hello, is it me you\u2019re looking for?: differentiating between human and electronic speakers for voice interface security. In: Proceedings of the 11th Conference on Security & Privacy in Wireless and Mobile Networks, pp. 123\u2013133. ACM (2018)","key":"23_CR5","DOI":"10.1145\/3212480.3212505"},{"unstructured":"Blumeyer, D.: Relative frequencies of english phonemes (2012). https:\/\/cmloegcmluin.wordpress.com\/2012\/11\/10\/relative-frequencies-of-english-phonemes\/. Accessed 27 Apr 2019","key":"23_CR6"},{"unstructured":"Carlini, N., et al.: Hidden voice commands. In: Proceedings of the 25th USENIX Security Symposium, pp. 513\u2013530 (2016)","key":"23_CR7"},{"doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Audio adversarial examples: targeted attacks on speech-to-text. In: IEEE Security and Privacy Workshops, pp. 1\u20137. IEEE (2018)","key":"23_CR8","DOI":"10.1109\/SPW.2018.00009"},{"doi-asserted-by":"crossref","unstructured":"Chen, S., et al.: You can hear but you cannot steal: defending against voice impersonation attacks on smartphones. In: Proceedings of the 37th International Conference on Distributed Computing Systems, pp. 183\u2013195. IEEE (2017)","key":"23_CR9","DOI":"10.1109\/ICDCS.2017.133"},{"doi-asserted-by":"crossref","unstructured":"De Leon, P.L., Pucher, M., Yamagishi, J., Hernaez, I., Saratxaga, I.: Evaluation of speaker verification security and detection of HMM-based synthetic speech. Transactions on Audio, Speech and Language Processing (2012)","key":"23_CR10","DOI":"10.1109\/TASL.2012.2201472"},{"doi-asserted-by":"crossref","unstructured":"Eberz, S., Rasmussen, K.B., Lenders, V., Martinovic, I.: Evaluating behavioral biometrics for continuous authentication. In: Proceedings of the 12th Asia Conference on Computer and Communications Security, pp. 386\u2013399 (2017)","key":"23_CR11","DOI":"10.1145\/3052973.3053032"},{"unstructured":"Ellis, D.P.W.: PLP and RASTA (and MFCC, and inversion) in Matlab (2005). http:\/\/www.ee.columbia.edu\/~dpwe\/resources\/matlab\/rastamat\/. Accessed 8 Jul 2019","key":"23_CR12"},{"doi-asserted-by":"crossref","unstructured":"Erg\u00fcnay, S.K., Khoury, E., Lazaridis, A., Marcel, S.: On the vulnerability of speaker verification to realistic voice spoofing. In: Proceedings of the 7th International Conference on Biometrics Theory, Applications and Systems, pp. 1\u20136. IEEE (2015)","key":"23_CR13","DOI":"10.1109\/BTAS.2015.7358783"},{"doi-asserted-by":"crossref","unstructured":"Evans, N., Kinnunen, T., Yamagishi, J.: Spoofing and countermeasures for automatic speaker verification. In: Proceedings of the Annual Conference of the International Speech Communication Association pp. 925\u2013929 (2013)","key":"23_CR14","DOI":"10.21437\/Interspeech.2013-288"},{"doi-asserted-by":"crossref","unstructured":"Fant, G.: Acoustic theory of speech production: with calculations based on X-ray studies of Russian articulations. No. 2, Walter de Gruyter (1970)","key":"23_CR15","DOI":"10.1515\/9783110873429"},{"unstructured":"Google: Set up Voice Match on Google Home - Google Home Help (2018). https:\/\/support.google.com\/googlehome\/answer\/7323910. Accessed 8 Jul 2019","key":"23_CR16"},{"issue":"1","key":"23_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1002\/dys.286","volume":"11","author":"T Helland","year":"2005","unstructured":"Helland, T., Kaasa, R.: Dyslexia in english as a second language. Dyslexia 11(1), 41\u201360 (2005)","journal-title":"Dyslexia"},{"unstructured":"HSBC: Voice ID \u2014 HSBC UK (2018). https:\/\/www.hsbc.co.uk\/1\/2\/voice-id. Accessed 8 Jul 2019","key":"23_CR18"},{"doi-asserted-by":"crossref","unstructured":"Hsu, C.C., Hwang, H.T., Wu, Y.C., Tsao, Y., Wang, H.M.: Voice conversion from non-parallel corpora using variational auto-encoder. In: Proceedings of the Signal and Information Processing Association Annual Summit and Conference, pp. 1\u20136. IEEE (2016)","key":"23_CR19","DOI":"10.1109\/APSIPA.2016.7820786"},{"doi-asserted-by":"crossref","unstructured":"Khoury, E., El Shafey, L., Marcel, S.: Spear: an open source toolbox for speaker recognition based on Bob. In: Proceedings of the International Conference on Acoustics, Speech and Signal Processing, pp. 1655\u20131659. IEEE (2014)","key":"23_CR20","DOI":"10.1109\/ICASSP.2014.6853879"},{"doi-asserted-by":"crossref","unstructured":"Kinnunen, T., Wu, Z.Z., Lee, K.A., Sedlak, F., Chng, E.S., Li, H.: Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech. In: Proceedings of the International Conference on Acoustics, Speech and Signal Processing, pp. 4401\u20134404. IEEE (2012)","key":"23_CR21","DOI":"10.1109\/ICASSP.2012.6288895"},{"issue":"1\u20132","key":"23_CR22","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn, H.W.: The hungarian method for the assignment problem. Naval Res. Logistics Q. 2(1\u20132), 83\u201397 (1955)","journal-title":"Naval Res. Logistics Q."},{"key":"23_CR23","first-page":"15","volume-title":"Lecture Notes in Computer Science","author":"Yee W. Lau","year":"2005","unstructured":"Lau, Y.W., Tran, D., Wagner, M.: Testing voice mimicry with the YOHO speaker verification corpus. In: Proceedings of the 9th International Conference on Knowledge-Based Intelligent Information And Engineering Systems, vol. 3584, pp. 15\u201321 (2005)"},{"doi-asserted-by":"crossref","unstructured":"Lindberg, J., Blomberg, M.: Vulnerability in speaker verification-a study of technical impostor techniques. In: Proceedings of the 6th European Conference on Speech Communication and Technology (1999)","key":"23_CR24","DOI":"10.21437\/Eurospeech.1999-310"},{"unstructured":"Lloyds Bank: Voice ID \u2014 Lloyds Bank (2019). https:\/\/www.lloydsbank.com\/contact-us\/voice-id.asp. Accessed 8 Jul 2019","key":"23_CR25"},{"doi-asserted-by":"crossref","unstructured":"Matrouf, D., Bonastre, J.F., Fredouille, C.: Effect of speech transformation on impostor acceptance. In: Proceedings of the 31st International Conference on Acoustics Speech and Signal Processing, vol. 1. IEEE (2006)","key":"23_CR26","DOI":"10.1109\/ICASSP.2006.1660175"},{"key":"23_CR27","first-page":"374","volume":"116","author":"P Mermelstein","year":"1976","unstructured":"Mermelstein, P.: Distance measures for speech recognition, psychological and instrumental. Pattern Recogn. Artif. Intell. 116, 374\u2013388 (1976)","journal-title":"Pattern Recogn. Artif. Intell."},{"unstructured":"Microsoft ML Blog Team: Now available: Speaker & video apis from microsoft project oxford. https:\/\/blogs.technet.microsoft.com\/machinelearning\/2015\/12\/14\/now-available-speaker-video-apis-from-microsoft-project-oxford\/","key":"23_CR28"},{"unstructured":"Povey, D., et al.: The kaldi speech recognition toolkit. In: Proceedings of the 2011 Workshop on Automatic Speech Recognition and Understanding. IEEE (2011)","key":"23_CR29"},{"unstructured":"Smith, J.O.: Physical audio signal processing. https:\/\/ccrma.stanford.edu\/~jos\/pasp\/Freeverb.html. Accessed 8 Jul 2019","key":"23_CR30"},{"doi-asserted-by":"crossref","unstructured":"Sun, L., Li, K., Wang, H., Kang, S., Meng, H.: Phonetic posteriorgrams for many-to-one voice conversion without parallel data training. In: Proceedings of the 2016 International Conference on Multimedia and Expo, pp. 1\u20136. IEEE (2016)","key":"23_CR31","DOI":"10.1109\/ICME.2016.7552917"},{"unstructured":"Toda, T., et al.: The voice conversion challenge 2016. In: Proceedings of the Annual Conference of the International Speech Communication Association (2016)","key":"23_CR32"},{"unstructured":"Vaidya, T., Zhang, Y., Sherr, M., Shields, C.: Cocaine noodles: exploiting the gap between human and machine speech recognition. In: Proceedings of the 9th USENIX Workshop on Offensive Technologies (2015)","key":"23_CR33"},{"unstructured":"Voxforge Dataset: Free speech... recognition. http:\/\/www.voxforge.org\/. Accessed 8 Jul 2019","key":"23_CR34"},{"unstructured":"Yuan, X., et al.: Commandersong: a systematic approach for practical adversarial voice recognition. In: Proceedings of the 27th USENIX Security Symposium, pp. 49\u201364 (2018)","key":"23_CR35"},{"doi-asserted-by":"crossref","unstructured":"Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., Xu, W.: Dolphinattack: inaudible voice commands. In: Proceedings of the 24th SIGSAC Conference on Computer and Communications Security, pp. 103\u2013117. ACM (2017)","key":"23_CR36","DOI":"10.1145\/3133956.3134052"},{"doi-asserted-by":"crossref","unstructured":"Zhang, L., Tan, S., Yang, J., Chen, Y.: Voicelive: a phoneme localization based liveness detection for voice authentication on smartphones. In: Proceedings of the 23rd SIGSAC Conference on Computer and Communications Security, pp. 1080\u20131091. ACM (2016)","key":"23_CR37","DOI":"10.1145\/2976749.2978296"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29959-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:06:27Z","timestamp":1726358787000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29959-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030299583","9783030299590"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29959-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.laas.fr\/esorics\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"344","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}