Preventing replay attacks on speaker verification systems
暂无分享,去创建一个
[1] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[2] Alex Acero,et al. Spoken Language Processing: A Guide to Theory, Algorithm and System Development , 2001 .
[3] Sridha Sridharan,et al. Feature warping for robust speaker verification , 2001, Odyssey.
[4] Javier Ramírez,et al. Voice activity detection with noise reduction and long-term spectral divergence estimation , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[5] P. Fränti,et al. Field Evaluation of Text-Dependent Speaker Recognition in an Access Control Application , 2005 .
[6] Gérard Chollet,et al. Voice Disguise and Automatic Detection: Review and Perspectives , 2005, WNSP.
[7] Gérard Chollet,et al. Voice forgery using ALISP: indexation in a client memory , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[8] David Talkin,et al. A Robust Algorithm for Pitch Tracking ( RAPT ) , 2005 .
[9] Patrick Kenny,et al. A Study of Interspeaker Variability in Speaker Verification , 2008, IEEE Transactions on Audio, Speech, and Language Processing.
[10] Lukás Burget,et al. Comparison of scoring methods used in speaker recognition with Joint Factor Analysis , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[11] Junichi Yamagishi,et al. Evaluation of the Vulnerability of Speaker Verification to Synthetic Speech , 2010, Odyssey.
[12] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.