A Cross-Database Study of Voice Presentation Attack Detection
暂无分享,去创建一个
[1] Sébastien Marcel,et al. On the vulnerability of speaker verification to realistic voice spoofing , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[2] Malcolm Slaney,et al. Construction and evaluation of a robust multifeature speech/music discriminator , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[3] Samy Bengio,et al. Can a Professional Imitator Fool a GMM-Based Speaker Verification System? , 2005 .
[4] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[5] Goutam Saha,et al. Generalization of spoofing countermeasures: A case study with ASVspoof 2015 and BTAS 2016 corpora , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Artur Janicki. Spoofing countermeasure based on analysis of linear prediction error , 2015, INTERSPEECH.
[7] Kong-Aik Lee,et al. The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection , 2017, INTERSPEECH.
[8] Jiwu Huang,et al. Audio recapture detection using deep learning , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[9] Haizhou Li,et al. Synthetic speech detection using temporal modulation feature , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[10] Junichi Yamagishi,et al. Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification , 2015, INTERSPEECH.
[11] Nicholas W. D. Evans,et al. A New Feature for Automatic Speaker Verification Anti-Spoofing: Constant Q Cepstral Coefficients , 2016, Odyssey.
[12] Bin Ma,et al. The reddots data collection for speaker recognition , 2015, INTERSPEECH.
[13] Christoph Busch,et al. Unit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features , 2016, INTERSPEECH.
[14] Tomi Kinnunen,et al. A comparison of features for synthetic speech detection , 2015, INTERSPEECH.
[15] Sébastien Marcel,et al. Score calibration in face recognition , 2014, IET Biom..
[16] Hemant A. Patil,et al. Combining evidences from mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech , 2015, INTERSPEECH.
[17] Aleksandr Sizov,et al. ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge , 2015, INTERSPEECH.
[18] Sébastien Marcel,et al. Impact of Score Fusion on Voice Biometrics and Presentation Attack Detection in Cross-Database Evaluations , 2017, IEEE Journal of Selected Topics in Signal Processing.
[19] Sébastien Marcel,et al. On the Generalization of Fused Systems in Voice Presentation Attack Detection , 2017, 2017 International Conference of the Biometrics Special Interest Group (BIOSIG).
[20] Sébastien Marcel,et al. End-to-End convolutional neural network-based voice presentation attack detection , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[21] Nicholas W. D. Evans,et al. Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification , 2017, Comput. Speech Lang..
[22] Nicholas W. D. Evans,et al. A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[23] Ibon Saratxaga,et al. Evaluation of Speaker Verification Security and Detection of HMM-Based Synthetic Speech , 2012, IEEE Transactions on Audio, Speech, and Language Processing.
[24] John Platt,et al. Probabilistic Outputs for Support vector Machines and Comparisons to Regularized Likelihood Methods , 1999 .
[25] Stan Davis,et al. Comparison of Parametric Representations for Monosyllabic Word Recognition in Continuously Spoken Se , 1980 .
[26] Rafal Samborski,et al. Playback attack detection for text-dependent speaker verification over telephone channels , 2015, Speech Commun..
[27] Vidhyasaharan Sethu,et al. Investigation of spectral centroid features for cognitive load classification , 2011, Speech Commun..
[28] Frank K. Soong,et al. On the use of instantaneous and transitional spectral information in speaker recognition , 1988, IEEE Trans. Acoust. Speech Signal Process..
[29] Heiga Zen,et al. Statistical Parametric Speech Synthesis , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[30] Haizhou Li,et al. Detecting Converted Speech and Natural Speech for anti-Spoofing Attack in Speaker Recognition , 2012, INTERSPEECH.
[31] Haizhou Li,et al. Spoofing and countermeasures for speaker verification: A survey , 2015, Speech Commun..
[32] Sébastien Marcel,et al. Cross-Database Evaluation of Audio-Based Spoofing Detection Systems , 2016, INTERSPEECH.
[33] Kong-Aik Lee,et al. RedDots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[34] S. Furui,et al. Cepstral analysis technique for automatic speaker verification , 1981 .