Technical Program

Paper Detail

Paper:SP-P3.2
Session:Topics in Speaker and Langauge Recognition
Time:Tuesday, May 18, 15:30 - 17:30
Presentation: Poster
Topic: Speech Processing: Speaker Recognition
Title: DESPERATELY SEEKING IMPOSTORS: DATA-MINING FOR COMPETITIVE IMPOSTOR TESTING IN A TEXT-DEPENDENT SPEAKER VERIFICATION SYSTEM
Authors: Matthieu H├ębert; Nuance Communications 
 Nikki Mirghafori; ICSI 
Abstract: Precise determination of the operating point of a real-world verification application is of great importance. For a text-dependent password-based security system, this can be a challenging task, as lexically matched impostor test data may be non-existent. In this work we present a data mining approach for extracting suitable impostor data. The approach may be applied to either the Target database (the application data itself) or the Stock databases (data from other applications). The method entails 1) determining Levenstein distances of impostor text utterances with respect to the claimant password 2) selecting subsets of impostor data at various levels of lexical distance, 3) calculating the score threshold using such subsets, 4) extrapolating the score threshold (and hence the operating point) for lexically perfectly-matched data. Experiments on four databases in two languages are presented. This approach, as applied to the Target database, provides an accurate and inexpensive solution to a formidable real-world problem.
 
           Back


Home -||- Organizing Committee -||- Technical Committee -||- Technical Program -||- Plenaries
Paper Submission -||- Special Sessions -||- ITT -||- Paper Review -||- Exhibits -||- Tutorials
Information -||- Registration -||- Travel Insurance -||- Housing -||- Workshops

©2015 Conference Management Services, Inc. -||- email: webmaster@icassp2004.org -||- Last updated Wednesday, April 07, 2004