{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:55:47Z","timestamp":1775066147502,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/icassp.2012.6288895","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T19:58:06Z","timestamp":1347047886000},"page":"4401-4404","source":"Crossref","is-referenced-by-count":117,"title":["Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech"],"prefix":"10.1109","author":[{"given":"Tomi","family":"Kinnunen","sequence":"first","affiliation":[]},{"given":"Zhi-Zheng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Kong Aik","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Filip","family":"Sedlak","sequence":"additional","affiliation":[]},{"given":"Eng Siong","family":"Chng","sequence":"additional","affiliation":[]},{"given":"Haizhou","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415192"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2005.06.003"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870086"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2007.914792"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/89.661472"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e90-d.5.816"},{"key":"11","article-title":"How vulnerable are prosodic features to professional imitators?","author":"farru?s","year":"0","journal-title":"The Speaker and Language Recognition Workshop (Odyssey 2008) Stellenbosch South Africa January 2008"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4960401"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.674423"},{"key":"20","first-page":"302","article-title":"Imposture using synthetic speech against speaker verification based on spectrum and pitch","volume":"2","author":"masuko","year":"2000","journal-title":"Proc Int Conf Spoken Lang Process (ICSLP)"},{"key":"22","first-page":"1173","article-title":"A first step towards text-independent voice conversion","author":"su?ndermann","year":"0","journal-title":"Proc Interspeech 2004 Jeju South Korea October 2004"},{"key":"23","first-page":"1969","article-title":"Frame alignment method for crosslingual voice conversion","author":"erro","year":"0","journal-title":"Proc Interspeech 2007 (ICSLP) Antwerp Belgium August 2007"},{"key":"24","first-page":"1732","article-title":"Text-independent F0 transformation with non-parallel data for voice conversion","author":"wu","year":"0","journal-title":"Proc Interspeech 2010 Makuhari Japan September 2010"},{"key":"25","article-title":"On the impact of alignment on voice conversion performance","author":"helander","year":"0","journal-title":"Ninth Annual Conference of the International Speech Communication Association 2008"},{"key":"26","year":"0","journal-title":"Speech Signal Processing Toolkit (SPTK) Version 3 1"},{"key":"27","first-page":"518","article-title":"A robust algorithm for pitch tracking (RAPT)","volume":"495","author":"talkin","year":"1995","journal-title":"Speech Coding and Synthesis"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"3","first-page":"1211","article-title":"Vulnerability in speaker verification - A study of technical impostor techniques","author":"lindberg","year":"0","journal-title":"Proc 6th European Conference on Speech Communication and Technology (Eurospeech 1999) Budapest Hungary September 1999"},{"key":"2","author":"kenny","year":"2006","journal-title":"Joint factor analysis of speaker and session variability Theory and algorithms"},{"key":"10","first-page":"15","article-title":"Testing voice mimicry with the YOHO speaker verification corpus","author":"lau","year":"2005","journal-title":"Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"7","first-page":"151","article-title":"Evaluation of the vulnerability of speaker verification to synthetic speech","author":"deleon","year":"0","journal-title":"Odyssey 2010 The Speaker and Language Recognition Workshop Brno Czech Republic June 2010"},{"key":"6","first-page":"759","article-title":"A robust speaker verification system against imposture using a HMMbased speech synthesis system","author":"satoh","year":"0","journal-title":"Proc 7th European Conference on Speech Communication and Technology (Eurospeech 2001) Aalborg Denmark September 2001"},{"key":"5","first-page":"837","author":"pellom","year":"1999","journal-title":"An Experimental Study of Speaker Verification Sensitivity to Computer Voice-altered Imposters"},{"key":"4","first-page":"131","article-title":"Speaker verification performance degradation against spoofing and tampering attacks","author":"villalba","year":"0","journal-title":"FALA 10 Workshop 2010"},{"key":"9","first-page":"2053","article-title":"Artificial impostor voice transformation effects on false acceptance rates","author":"bonastre","year":"0","journal-title":"Proc Interspeech 2007 (ICSLP) Antwerp Belgium August 2007"},{"key":"8","first-page":"4845","article-title":"Is voice transformation a threat to speaker identification?","author":"jin","year":"0","journal-title":"Proc ICASSP 2008 March 2008"}],"event":{"name":"ICASSP 2012 - 2012 IEEE International Conference on Acoustics, Speech and Signal Processing","location":"Kyoto, Japan","start":{"date-parts":[[2012,3,25]]},"end":{"date-parts":[[2012,3,30]]}},"container-title":["2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6268628\/6287775\/06288895.pdf?arnumber=6288895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:48:57Z","timestamp":1490132937000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6288895\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icassp.2012.6288895","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}