N. K. Ratha, J. Connell, and R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001.

. Iso/iec, Information technology-biometric presentation attack detection-part 1: Framework, Online; accessed, vol.22, pp.30107-30108, 2016.

Z. Wu, N. W. Evans, T. Kinnunen, J. Yamagishi, F. Alegre et al., Spoofing and countermeasures for speaker verification: A survey, Speech Comm, vol.66, pp.130-153, 2015.

Z. Wu, T. Kinnunen, N. E. , J. Yamagishi, C. Hanilçi et al., ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge, pp.2037-2041, 2015.

S. K. Ergunay, E. Khoury, A. Lazaridis, and S. Marcel, On the vulnerability of speaker verification to realistic voice spoofing, BTAS, pp.1-6, 2015.

B. Biggio and F. Roli, Wild patterns: Ten years after the rise of adversarial machine learning, Pat. Rec, vol.84, pp.317-331, 2018.

T. Toda, L. Chen, D. Saito, F. Villavicencio, M. Wester et al., The voice conversion challenge 2016, Proc. Interspeech, pp.1632-1636, 2016.

J. Lorenzo-trueba, J. Yamagishi, T. Toda, D. Saito, F. Villavicencio et al., The voice conversion challenge 2018: Promoting development of parallel and nonparallel methods, Odyssey: the Speaker and Language Recognition Workshop, pp.195-202, 2018.

J. E. Luck, Automatic speaker verification using cepstral measurements, J. of the Acoustic Society of America, vol.46, issue.4, pp.1026-1032, 1969.

W. Endres, W. Bambach, and G. Flösser, Voice spectrograms as a function of age, voice disguise, and voice imitation, J. of the Acoustical Society of America, vol.49, issue.6, pp.1842-1848, 1971.

Y. W. Lau, M. Wagner, and D. Tran, Vulnerability of speaker verification to voice mimicking, Proc. Int. Symp on Intelligent Multimedia, Video & Speech Processing, pp.145-148, 2004.

J. Mariéthoz and S. Bengio, Can a professional imitator fool a GMM-based speaker verification system?, IDIAP research report, pp.5-61, 2005.

A. Eriksson, The disguised voice: imitating accents or speech styles and impersonating individuals, vol.8, pp.86-96, 2010.

R. G. Hautamäki, T. Kinnunen, V. Hautamäki, and A. M. Laukkanen, Automatic versus human speaker verification: The case of voice mimicry, Speech Comm, vol.72, pp.13-31, 2015.

M. Farrús, Voice disguise in automatic speaker recognition, ACM Comput. Surv, vol.51, issue.4, p.22, 2018.

J. Lorenzo-trueba, F. Fang, X. Wang, I. Echizen, J. Yamagishi et al., Can we steal your vocal identity from the internet? Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data, Odyssey: The Speaker and Language Recognition Workshop, pp.240-247, 2018.

S. Panjwani and A. Prakash, Crowdsourcing attacks on biometric systems, Tenth Symposium on Usable Privacy and Security, pp.257-269, 2014.

A. Nagrani, J. S. Chung, and A. Zisserman, VoxCeleb: A large-scale speaker identification dataset, pp.2616-2620, 2017.

J. S. Chung, A. Nagrani, and A. Zisserman, VoxCeleb2: Deep speaker recognition, pp.1086-1090, 2018.

N. Papernot, P. D. Mcdaniel, I. J. Goodfellow, S. Jha, Z. B. Celik et al., Practical black-box attacks against machine learning, Proc. ACM on Asia Conf. on Computer and Comm. Security, pp.506-519, 2017.

T. Kinnunen and H. Li, An overview of text-independent speaker recognition: From features to supervectors, Speech communication, vol.52, issue.1, pp.12-40, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00587602

V. Panayotov, G. Chen, D. Povey, and S. Khudanpur, Librispeech: An ASR corpus based on public domain audio books, Proc. ICASSP, pp.5206-5210, 2015.

R. G. Hautamäki, M. Sahidullah, V. Hautamäki, and T. Kinnunen, Acoustical and perceptual study of voice disguise by age modification in speaker verification, Speech Comm, vol.95, pp.1-15, 2017.

D. Snyder, D. Garcia-romero, G. Sell, D. Povey, and S. Khudanpur, X-vectors: Robust DNN embeddings for speaker recognition, Proc. ICASSP. IEEE, 2018.

D. Povey, A. Ghoshal, G. Boulianne, L. Burget, O. Glembek et al., The Kaldi Speech Recognition Toolkit, Proc. IEEE ASRU, 2011.