A case study of impersonation from a security systems point of view

Research output: Working paper

Standard

A case study of impersonation from a security systems point of view. / Zetterholm, Elisabeth; Elenius, Daniel; Blomberg, Mats.

2005. (Working Papers 51, Department of Linguistics, Lund University).

Research output: Working paper

Harvard

Zetterholm, E, Elenius, D & Blomberg, M 2005 'A case study of impersonation from a security systems point of view' Working Papers 51, Department of Linguistics, Lund University.

APA

Zetterholm, E., Elenius, D., & Blomberg, M. (2005). A case study of impersonation from a security systems point of view. (Working Papers 51, Department of Linguistics, Lund University).

CBE

Zetterholm E, Elenius D, Blomberg M. 2005. A case study of impersonation from a security systems point of view. (Working Papers 51, Department of Linguistics, Lund University).

MLA

Zetterholm, Elisabeth, Daniel Elenius and Mats Blomberg A case study of impersonation from a security systems point of view. Working Papers 51, Department of Linguistics, Lund University. 2005.,

Vancouver

Zetterholm E, Elenius D, Blomberg M. A case study of impersonation from a security systems point of view. 2005. (Working Papers 51, Department of Linguistics, Lund University).

Author

Zetterholm, Elisabeth ; Elenius, Daniel ; Blomberg, Mats. / A case study of impersonation from a security systems point of view. 2005. (Working Papers 51, Department of Linguistics, Lund University).

RIS

TY - UNPB

T1 - A case study of impersonation from a security systems point of view

AU - Zetterholm, Elisabeth

AU - Elenius, Daniel

AU - Blomberg, Mats

PY - 2005

Y1 - 2005

N2 - A professional impersonator has been studied when training his voice to mimic two target speakers. Training was performed by listening and/or using the output from a speaker verification system as feedback. Tests after training showed a significant increase in verfication score.

AB - A professional impersonator has been studied when training his voice to mimic two target speakers. Training was performed by listening and/or using the output from a speaker verification system as feedback. Tests after training showed a significant increase in verfication score.

M3 - Working paper

T3 - Working Papers 51, Department of Linguistics, Lund University

BT - A case study of impersonation from a security systems point of view

ER -