Performing a Presentation Attack Detection on Voice Biometrics
暂无分享,去创建一个
[1] M. Wagner,et al. Vulnerability of speaker verification to voice mimicking , 2004, Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004..
[2] Zhizheng Wu,et al. Voice conversion and spoofing attack on speaker verification systems , 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.
[3] 中尾 康二. ISO/IEC JTC 1/SC27 : セキュリティ技術 (画像電子年報) -- (標準化動向) , 2002 .
[4] Judith Liu-Jimenez,et al. Best practices for the security evaluation of biometric systems , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).