Speaker Recognition Anti-spoofing
暂无分享,去创建一个
Tomi Kinnunen | Zhizheng Wu | Nicholas W. D. Evans | Junichi Yamagishi | Federico Alegre | Phillip L. De Leon | J. Yamagishi | N. Evans | T. Kinnunen | Zhizheng Wu | F. Alegre | P. D. Leon
[1] Haizhou Li,et al. An overview of text-independent speaker recognition: From features to supervectors , 2010, Speech Commun..
[2] Alexander Kain,et al. Spectral voice conversion for text-to-speech synthesis , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[3] Dennis H. Klatt,et al. Software for a cascade/parallel formant synthesizer , 1980 .
[4] Inma Hernáez,et al. Parametric Voice Conversion Based on Bilinear Frequency Warping Plus Amplitude Scaling , 2013, IEEE Transactions on Audio, Speech, and Language Processing.
[5] Mireia Farrús,et al. How vulnerable are prosodic features to professional imitators? , 2008, Odyssey.
[6] Satoshi Nakamura,et al. Voice conversion through vector quantization , 1988, ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing.
[7] Haizhou Li,et al. Mixture of Factor Analyzers Using Priors From Non-Parallel Speech for Voice Conversion , 2012, IEEE Signal Processing Letters.
[8] Anders Eriksson,et al. How flexible is the human voice? - a case study of mimicry , 1997, EUROSPEECH.
[9] Eric Moulines,et al. Continuous probabilistic transform for voice conversion , 1998, IEEE Trans. Speech Audio Process..
[10] Gérard Chollet,et al. Synthetic Voice Forgery in the Forensic Context: a short tutorial , 2011 .
[11] Olivier Boëffard,et al. Pitch and Duration Transformation with Non-parallel Data , 2008 .
[12] Ibon Saratxaga,et al. Detection of synthetic speech for the problem of imposture , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[13] Moncef Gabbouj,et al. Voice Conversion Using Dynamic Kernel Partial Least Squares Regression , 2012, IEEE Transactions on Audio, Speech, and Language Processing.
[14] William M. Campbell,et al. Advances in channel compensation for SVM speaker recognition , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[15] Jia Liu,et al. Voice conversion with smoothed GMM and MAP adaptation , 2003, INTERSPEECH.
[16] Moncef Gabbouj,et al. Voice Conversion Using Partial Least Squares Regression , 2010, IEEE Transactions on Audio, Speech, and Language Processing.
[17] Tomoki Toda,et al. Voice Conversion Based on Maximum-Likelihood Estimation of Spectral Parameter Trajectory , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[18] Keiichi Tokuda,et al. Speech synthesis using HMMs with dynamic features , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[19] Elina Helander,et al. A Novel Method for Prosody Prediction in Voice Conversion , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[20] Haizhou Li,et al. Conditional restricted Boltzmann machine for voice conversion , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.
[21] Keiichi Tokuda,et al. A robust speaker verification system against imposture using an HMM-based speech synthesis system , 2001, INTERSPEECH.
[22] Haizhou Li,et al. Detecting Converted Speech and Natural Speech for anti-Spoofing Attack in Speaker Recognition , 2012, INTERSPEECH.
[23] Bin Ma,et al. Sparse Classifier Fusion for Speaker Verification , 2013, IEEE Transactions on Audio, Speech, and Language Processing.
[24] H. Ney,et al. VTLN-based voice conversion , 2003, Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology (IEEE Cat. No.03EX795).
[25] Junichi Yamagishi,et al. Synthetic Speech Discrimination using Pitch Pattern Statistics Derived from Image Analysis , 2012, INTERSPEECH.
[26] Eduardo Lleida,et al. Preventing replay attacks on speaker verification systems , 2011, 2011 Carnahan Conference on Security Technology.
[27] Hermann Ney,et al. Text-Independent Voice Conversion Based on Unit Selection , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[28] Nicholas W. D. Evans,et al. Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals , 2012, INTERSPEECH.
[29] Keiichi Tokuda,et al. Voice characteristics conversion for HMM-based speech synthesis system , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[30] Umar Mohammed,et al. Probabilistic Models for Inference about Identity , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[31] Daniel Elenius,et al. A comparison between human perception and a speaker verification system score of a voice imitation. , 2004 .
[32] M. Wagner,et al. Vulnerability of speaker verification to voice mimicking , 2004, Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004..
[33] Andreas Stolcke,et al. Within-class covariance normalization for SVM-based speaker recognition , 2006, INTERSPEECH.
[34] Marc C. Beutnagel,et al. The AT & T NEXT-GEN TTS system , 1999 .
[35] Nicholas W. D. Evans,et al. Spoofing countermeasures to protect automatic speaker verification from voice conversion , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[36] Yu Tsao,et al. Exploring mutual information for GMM-based spectral conversion , 2012, 2012 8th International Symposium on Chinese Spoken Language Processing.
[37] Gian Luca Marcialis,et al. Evaluation of serial and parallel multibiometric systems under spoofing attacks , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[38] Haizhou Li,et al. Synthetic speech detection using temporal modulation feature , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[39] Philip C. Woodland,et al. Maximum likelihood linear regression for speaker adaptation of continuous density hidden Markov models , 1995, Comput. Speech Lang..
[40] Alan W. Black,et al. CLUSTERGEN: a statistical parametric synthesizer using trajectory modeling , 2006, INTERSPEECH.
[41] Levent M. Arslan,et al. Speaker Transformation Algorithm using Segmental Codebooks (STASC) , 1999, Speech Commun..
[42] Lakhmi C. Jain,et al. Knowledge-Based Intelligent Information and Engineering Systems , 2004, Lecture Notes in Computer Science.
[43] Alan W. Black,et al. Unit selection in a concatenative speech synthesis system using a large speech database , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[44] Patrick Kenny,et al. Front-End Factor Analysis for Speaker Verification , 2011, IEEE Transactions on Audio, Speech, and Language Processing.
[45] Ren-Hua Wang,et al. USTC System for Blizzard Challenge 2006 an Improved HMM-based Speech Synthesis Method , 2006 .
[46] Kishore Prahallad,et al. Voice conversion using Artificial Neural Networks , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[47] Daniel Erro,et al. Voice Conversion Based on Weighted , 2010 .
[48] David A. van Leeuwen,et al. Fusion of Heterogeneous Speaker Recognition Systems in the STBU Submission for the NIST Speaker Recognition Evaluation 2006 , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[49] Keiichi Tokuda,et al. Simultaneous modeling of spectrum, pitch and duration in HMM-based speech synthesis , 1999, EUROSPEECH.
[50] Alex Hirschfield,et al. Toward a dynamic framework for security evaluation of voice verification systems , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[51] Patrick Kenny,et al. A Study of Interspeaker Variability in Speaker Verification , 2008, IEEE Transactions on Audio, Speech, and Language Processing.
[52] Keikichi Hirose,et al. One-to-Many Voice Conversion Based on Tensor Representation of Speaker Space , 2011, INTERSPEECH.
[53] Nicholas W. D. Evans,et al. A new speaker verification spoofing countermeasure based on local binary patterns , 2013, INTERSPEECH.
[54] Nicholas W. D. Evans,et al. On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[55] Nicholas W. D. Evans,et al. A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[56] Moncef Gabbouj,et al. Local linear transformation for voice conversion , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[57] Tomi Kinnunen,et al. I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry , 2013, INTERSPEECH.
[58] Ibon Saratxaga,et al. Evaluation of Speaker Verification Security and Detection of HMM-Based Synthetic Speech , 2012, IEEE Transactions on Audio, Speech, and Language Processing.
[59] Haizhou Li,et al. A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case , 2012, Proceedings of The 2012 Asia Pacific Signal and Information Processing Association Annual Summit and Conference.
[60] Peter Jackson,et al. A phonologically motivated method of selecting non-uniform units , 1998, ICSLP.
[61] Haizhou Li,et al. Text-independent F0 transformation with non-parallel data for voice conversion , 2010, INTERSPEECH.
[62] Takao Kobayashi,et al. Analysis of Speaker Adaptation Algorithms for HMM-Based Speech Synthesis and a Constrained SMAPLR Adaptation Algorithm , 2009, IEEE Transactions on Audio, Speech, and Language Processing.
[63] Yu Tsao,et al. A Study of Mutual Information for GMM-Based Spectral Conversion , 2012, INTERSPEECH.
[64] Heiga Zen,et al. Details of the Nitech HMM-Based Speech Synthesis System for the Blizzard Challenge 2005 , 2007, IEICE Trans. Inf. Syst..
[65] Haizhou Li,et al. Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints , 2013, INTERSPEECH.
[66] John H. L. Hansen,et al. An experimental study of speaker verification sensitivity to computer voice-altered imposters , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[67] Lukás Burget,et al. Analysis of Feature Extraction and Channel Compensation in a GMM Speaker Recognition System , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[68] Douglas A. Reynolds,et al. Robust text-independent speaker identification using Gaussian mixture speaker models , 1995, IEEE Trans. Speech Audio Process..
[69] Nobuaki Minematsu,et al. Statistical Voice Conversion Based on Noisy Channel Model , 2012, IEEE Transactions on Audio, Speech, and Language Processing.
[70] Heiga Zen,et al. Statistical Parametric Speech Synthesis , 2007, IEEE International Conference on Acoustics, Speech, and Signal Processing.
[71] Sadaoki Furui,et al. Likelihood normalization for speaker verification using a phoneme- and speaker-independent model , 1995, Speech Commun..
[72] John H. L. Hansen,et al. I4u submission to NIST SRE 2012: a large-scale collaborative effort for noise-robust speaker verification , 2013, INTERSPEECH.
[73] Li-Rong Dai,et al. Speaker verification against synthetic speech , 2010, 2010 7th International Symposium on Chinese Spoken Language Processing.
[74] Tomi Kinnunen,et al. Spoofing and countermeasures for automatic speaker verification , 2013, INTERSPEECH.
[75] Bayya Yegnanarayana,et al. Transformation of formants for voice conversion using artificial neural networks , 1995, Speech Commun..
[76] Justin Fackrell,et al. Segment selection in the L&h Realspeak laboratory TTS system , 2000, INTERSPEECH.
[77] Philip C. Woodland. Speaker adaptation for continuous density HMMs: a review , 2001 .
[78] Akio Ogihara,et al. Discrimination Method of Synthetic Speech Using Pitch Frequency against Synthetic Speech Falsification , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[79] Alvin F. Martin,et al. The DET curve in assessment of detection task performance , 1997, EUROSPEECH.
[80] Patrick Kenny,et al. Speaker and Session Variability in GMM-Based Speaker Verification , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[81] Gérard Chollet,et al. Voice forgery using ALISP: indexation in a client memory , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[82] Samy Bengio,et al. Can a Professional Imitator Fool a GMM-Based Speaker Verification System? , 2005 .
[83] Chng Eng Siong,et al. Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[84] H. Zen,et al. Continuous Stochastic Feature Mapping Based on Trajectory HMMs , 2011, IEEE Transactions on Audio, Speech, and Language Processing.
[85] Andreas Stolcke,et al. Modeling prosodic feature sequences for speaker recognition , 2005, Speech Commun..
[86] Gang Wei,et al. Channel pattern noise based playback attack detection algorithm for speaker recognition , 2011, 2011 International Conference on Machine Learning and Cybernetics.
[87] Heiga Zen,et al. Gaussian Process Experts for Voice Conversion , 2011, INTERSPEECH.
[88] Douglas E. Sturim,et al. Support vector machines using GMM supervectors for speaker verification , 2006, IEEE Signal Processing Letters.
[89] Keiichi Tokuda,et al. On the security of HMM-based speaker verification systems against imposture using synthetic speech , 1999, EUROSPEECH.
[90] Lukás Burget,et al. iVector Fusion of Prosodic and Cepstral Features for Speaker Verification , 2011, INTERSPEECH.
[91] Martti Vainio,et al. Intonational speaker verification: A study on parameters and performance under noisy conditions , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[92] Eric Moulines,et al. Pitch-synchronous waveform processing techniques for text-to-speech synthesis using diphones , 1989, Speech Commun..
[93] Daniel Garcia-Romero,et al. Analysis of i-vector Length Normalization in Speaker Recognition Systems , 2011, INTERSPEECH.
[94] Patrick Kenny,et al. Joint Factor Analysis of Speaker and Session Variability: Theory and Algorithms , 2006 .
[95] Chung-Hsien Wu,et al. Voice conversion using duration-embedded bi-HMMs for expressive speech synthesis , 2006, IEEE Transactions on Audio, Speech, and Language Processing.
[96] Simon King,et al. Transforming F0 contours , 2003, INTERSPEECH.
[97] Thomas Quatieri,et al. Discrete-Time Speech Signal Processing: Principles and Practice , 2001 .
[98] Federico Alegre,et al. Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals , 2012 .
[99] Sridha Sridharan,et al. Feature warping for robust speaker verification , 2001, Odyssey.
[100] Driss Matrouf,et al. Effect of Speech Transformation on Impostor Acceptance , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[101] Yannis Stylianou,et al. Voice Transformation: A survey , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[102] Peng Song,et al. Voice conversion using support vector regression , 2011 .
[103] Robert E. Donovan,et al. The IBM trainable speech synthesis system , 1998, ICSLP.
[104] Wei Shang,et al. Score normalization in playback attack detection , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[105] Mats Blomberg,et al. Vulnerability in speaker verification - a study of technical impostor techniques , 1999, EUROSPEECH.
[106] Dat Tran,et al. Testing Voice Mimicry with the YOHO Speaker Verification Corpus , 2005, KES.
[107] Tatsuya Kitamura,et al. Acoustic analysis of imitated voice produced by a professional impersonator , 2008, INTERSPEECH.
[108] Patrick Kenny,et al. Continuous prosodic features and formant modeling with joint factor analysis for speaker verification , 2007, INTERSPEECH.
[109] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..