An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
暂无分享,去创建一个
[1] Walid Karam,et al. Some results from the biosecure talking face evaluation campaign , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[2] Heiga Zen,et al. Statistical parametric speech synthesis using deep neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[3] Tomi Kinnunen,et al. Spoofing and countermeasures for automatic speaker verification , 2013, INTERSPEECH.
[4] Junichi Yamagishi,et al. Revisiting the security of speaker verification systems against imposture using synthetic speech , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[5] Umar Mohammed,et al. Probabilistic Models for Inference about Identity , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Rafal Samborski,et al. Playback attack detection for text-dependent speaker verification over telephone channels , 2015, Speech Commun..
[7] Abdenour Hadid,et al. Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned , 2015, IEEE Signal Processing Magazine.
[8] Jiwu Huang,et al. Audio recapture detection using deep learning , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[9] Hideki Kawahara,et al. Aperiodicity extraction and control using mixed mode excitation and group delay manipulation for a high quality speech analysis, modification and synthesis system STRAIGHT , 2001, MAVEBA.
[10] Douglas A. Reynolds,et al. A Tutorial on Text-Independent Speaker Verification , 2004, EURASIP J. Adv. Signal Process..
[11] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[12] Nicholas W. D. Evans,et al. Re-assessing the threat of replay spoofing attacks against automatic speaker verification , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[13] Roland Auckenthaler,et al. Score Normalization for Text-Independent Speaker Verification Systems , 2000, Digit. Signal Process..
[14] Haizhou Li,et al. Synthetic speech detection using temporal modulation feature , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[15] Junichi Yamagishi,et al. Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification , 2015, INTERSPEECH.
[16] Tomi Kinnunen,et al. A comparison of features for synthetic speech detection , 2015, INTERSPEECH.
[17] Peter Vary,et al. A binaural room impulse response database for the evaluation of dereverberation algorithms , 2009, 2009 16th International Conference on Digital Signal Processing.
[18] Alan W. Black,et al. Unit selection in a concatenative speech synthesis system using a large speech database , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[19] Douglas E. Sturim,et al. Support vector machines using GMM supervectors for speaker verification , 2006, IEEE Signal Processing Letters.
[20] Nicholas W. D. Evans,et al. ALIZE/spkdet: a state-of-the-art open source software for speaker recognition , 2008, Odyssey.
[21] John H. L. Hansen,et al. An experimental study of speaker verification sensitivity to computer voice-altered imposters , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[22] Jean Hennebert,et al. Text-prompted speaker verification experiments with phoneme specific MLPs , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[23] Wei Shang,et al. Score normalization in playback attack detection , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[24] Mats Blomberg,et al. Vulnerability in speaker verification - a study of technical impostor techniques , 1999, EUROSPEECH.
[25] Dennis H. Klatt,et al. Software for a cascade/parallel formant synthesizer , 1980 .
[26] Nicholas W. D. Evans,et al. A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[27] Gang Wei,et al. Channel pattern noise based playback attack detection algorithm for speaker recognition , 2011, 2011 International Conference on Machine Learning and Cybernetics.
[28] Ibon Saratxaga,et al. Evaluation of Speaker Verification Security and Detection of HMM-Based Synthetic Speech , 2012, IEEE Transactions on Audio, Speech, and Language Processing.
[29] Takao Kobayashi,et al. Analysis of Speaker Adaptation Algorithms for HMM-Based Speech Synthesis and a Constrained SMAPLR Adaptation Algorithm , 2009, IEEE Transactions on Audio, Speech, and Language Processing.
[30] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[31] Eduardo Lleida,et al. Preventing replay attacks on speaker verification systems , 2011, 2011 Carnahan Conference on Security Technology.
[32] Treebank Penn,et al. Linguistic Data Consortium , 1999 .
[33] Nicholas W. D. Evans,et al. Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals , 2012, INTERSPEECH.
[34] Nicholas W. D. Evans,et al. Spoofing countermeasures to protect automatic speaker verification from voice conversion , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[35] Daniel Elenius,et al. Speaker verification scores and acoustic analysis of a professional impersonator , 2004 .
[36] Tomi Kinnunen,et al. Speaker Recognition Anti-spoofing , 2014, Handbook of Biometric Anti-Spoofing.
[37] Keiichi Tokuda,et al. On the security of HMM-based speaker verification systems against imposture using synthetic speech , 1999, EUROSPEECH.
[38] Daniel Garcia-Romero,et al. Analysis of i-vector Length Normalization in Speaker Recognition Systems , 2011, INTERSPEECH.
[39] Matti Pietikäinen,et al. Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[40] Stephanie Schuckers,et al. Multimodal fusion vulnerability to non-zero effort (spoof) imposters , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[41] Eric Moulines,et al. Pitch-synchronous waveform processing techniques for text-to-speech synthesis using diphones , 1989, Speech Commun..
[42] R. Moore,et al. Explicit modelling of state occupancy in hidden Markov models for automatic speech recognition , 1985, ICASSP '85. IEEE International Conference on Acoustics, Speech, and Signal Processing.
[43] Robert E. Schapire,et al. A Brief Introduction to Boosting , 1999, IJCAI.
[44] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[45] Aleksandr Sizov,et al. ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge , 2015, INTERSPEECH.
[46] Gérard Chollet,et al. Voice forgery using ALISP: indexation in a client memory , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[47] Haizhou Li,et al. A study on replay attack and anti-spoofing for text-dependent speaker verification , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.
[48] S. Imai,et al. Mel Log Spectrum Approximation (MLSA) filter for speech synthesis , 1983 .
[49] Yoav Freund,et al. A Short Introduction to Boosting , 1999 .
[50] Keiichi Tokuda,et al. Speech parameter generation algorithms for HMM-based speech synthesis , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[51] Mireia Farrús,et al. How vulnerable are prosodic features to professional imitators? , 2008, Odyssey.
[52] Haizhou Li,et al. Spoofing and countermeasures for speaker verification: A survey , 2015, Speech Commun..
[53] Driss Matrouf,et al. Artificial impostor voice transformation effects on false acceptance rates , 2007, INTERSPEECH.
[54] Patrick Kenny,et al. Bayesian Speaker Verification with Heavy-Tailed Priors , 2010, Odyssey.
[55] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[56] Aleksandr Sizov,et al. Classifiers for synthetic speech detection: a comparison , 2015, INTERSPEECH.
[57] Driss Matrouf,et al. State-of-the-Art Performance in Text-Independent Speaker Verification Through Open-Source Software , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[58] Florin Curelaru,et al. Front-End Factor Analysis For Speaker Verification , 2018, 2018 International Conference on Communications (COMM).
[59] Heiga Zen,et al. Robust Speaker-Adaptive HMM-Based Text-to-Speech Synthesis , 2009, IEEE Transactions on Audio, Speech, and Language Processing.
[60] Heiga Zen,et al. The HMM-based speech synthesis system (HTS) version 2.0 , 2007, SSW.
[61] Driss Matrouf,et al. Transfer Function-Based Voice Transformation for Speaker Recognition , 2006, 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop.
[62] Federico Alegre,et al. Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals , 2012 .
[63] Sébastien Marcel,et al. On the vulnerability of speaker verification to realistic voice spoofing , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[64] Nicholas W. D. Evans,et al. A new speaker verification spoofing countermeasure based on local binary patterns , 2013, INTERSPEECH.
[65] Nicholas W. D. Evans,et al. On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[66] Douglas E. Sturim,et al. SVM Based Speaker Verification using a GMM Supervector Kernel and NAP Variability Compensation , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[67] M. Wester. The EMIME Bilingual Database , 2010 .
[68] Keiichi Tokuda,et al. Incorporating a mixed excitation model and postfilter into HMM-based text-to-speech synthesis , 2005, Systems and Computers in Japan.