Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Effective speaker spotting for watch-list detection of fraudsters in telephone banking

This study describes a special-case application of speaker recognition in open-set speaker-identification mode, which nonetheless has wide applicability. Watch-list based speaker spotting in telephone banking can potentially provide valuable protection against ‘known’ fraudsters with access to stolen customer details. In this study, the detection of known fraudsters in a telephone banking service using commercial off-the-shelf verification engines is described. A new ‘delta scoring’ method for watch-list detection is proposed based on using the genuine customer model as a reference. The approach combines for the first time speaker recognition in both verification and identification mode. Empirical experiment results show a significant gain in performance using the new method.

References

    1. 1)
    2. 2)
    3. 3)
      • 17. Sturim, D.E., Reynolds, D.A.: ‘Speaker adaptive cohort selection for tnorm in text-independent speaker verification’, ICASSP, 2005, 0, (1), pp. 741744.
    4. 4)
      • 3. Malegaonkar, A., Ariyaeeinia, A.: ‘Performance evaluation in open-set speaker identification’. Biometrics and ID Management – COST 2011 European Workshop, 2011.
    5. 5)
    6. 6)
      • 11. Agnitio: ‘Agnitio kivox 4.0 the power of voice (White Paper)’.
    7. 7)
    8. 8)
      • 4. Fortuna, J., Sivakumaran, P., Ariyaeeinia, A.M., Malegaonkar, A.: ‘Relative effectiveness of score normalisation methods in open-set speaker identification’. ODYSSEY the Speaker and Language Recognition Workshop, 2004.
    9. 9)
    10. 10)
      • 12. Martin, A., Przybocki, M., Campbell, J.P.Jr.: ‘The NIST speaker recognition evaluation program’, in Wayman, J., Jain, A.K., Wayman, D. (Eds.): ‘Biometric systems: technology, design and performance evaluation’ (Springer, 2005), pp. 241262.
    11. 11)
    12. 12)
    13. 13)
      • 7. Singer, E., Reynolds, D.: ‘Analysis of multi-target detection for speaker and language recognition’. ODYSSEY – The Speaker and Language Recognition Workshop, 2004.
    14. 14)
      • 23. Martin, A., Doddington, G., Kamm, T., Ordowski, M., Przybocki, M.: ‘The DET curve in assessment of detection task performance’. Proc. Eurospeech ‘97, 1997, pp. 18951898.
    15. 15)
    16. 16)
      • 8. Zigel, Y., Wasserbiat, M.: ‘How to deal with multiple-targets in speaker identification systems ?ODYSSEY – The Speaker and Language Recognition Workshop, 2006, pp. 17.
    17. 17)
      • 20. Garcia-Romero, D., Espy-Wilson, C.Y.: ‘Analysis of I-vector length normalization in speaker recognition systems’. INTERSPEECH, 2011, pp. 249252.
    18. 18)
      • 21. Brümmer, N., Garcia-Romero, D.: ‘Generative modelling for unsupervised score calibration’. Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2014.
    19. 19)
      • 24. Greenberg, C.S., Stanford, V.M., Martin, A.F., et al: ‘The 2012 NIST speaker recognition evaluation’. Interspeech, August 2013, pp. 19711975.
    20. 20)
      • 6. Ramasubramanian, V.: ‘Speaker spotting: Automatic telephony surveillance for homeland security’, in Neustein, A., Hemant, A. (Eds.): ‘Forensic speaker recognition: law enforcement and counter-terrorism’ (2012), pp. 427468.
    21. 21)
      • 19. Kenny, P.: ‘Bayesian speaker verification with heavy-tailed priors’. ODYSSEY – The Speaker and Language Recognition Workshop, 2010.
    22. 22)
      • 10. González-Rodriguez, J., Toledano, D.T., Ortega-García, J.: ‘Voice biometrics’, in Jain, A.K., Flynn, P., Ross, A. (Eds.): ‘Handbook of biometrics’ (Springer, 2008).
    23. 23)
    24. 24)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2013.0060
Loading

Related content

content/journals/10.1049/iet-bmt.2013.0060
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address