메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1144-1149

A playback attack detector for speaker verification systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS;

EID: 50649111857     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCCSP.2008.4537397     Document Type: Conference Paper
Times cited : (27)

References (5)
  • 1
    • 85135261394 scopus 로고    scopus 로고
    • Vulnerability in speaker verification - a study of possible technical impostor techniques
    • Budapest
    • J. Lindberg and M. Blomberg, "Vulnerability in speaker verification - a study of possible technical impostor techniques," in Proc. EUROSPEECH, Budapest, 1999, pp. 1211-1214.
    • (1999) Proc. EUROSPEECH , pp. 1211-1214
    • Lindberg, J.1    Blomberg, M.2
  • 3
    • 33947714703 scopus 로고    scopus 로고
    • Effect of speech transformation on impostor acceptance
    • D. Matrouf, J.F. Bonastre, and C. Fredouille, "Effect of speech transformation on impostor acceptance," in ICASSP, 2006, pp. 933-936.
    • (2006) ICASSP , pp. 933-936
    • Matrouf, D.1    Bonastre, J.F.2    Fredouille, C.3
  • 5
    • 85046873967 scopus 로고    scopus 로고
    • The DET curve in assessment of detection task performance
    • Rhodes, Greece
    • Alvin Martin, George Doddington, Terri Kamm, Mark Ordowski, and Mark Przybocki, "The DET curve in assessment of detection task performance," in Proc. Eurospeech '97, Rhodes, Greece, 1997, pp. 1895-1898.
    • (1997) Proc. Eurospeech '97 , pp. 1895-1898
    • Martin, A.1    Doddington, G.2    Kamm, T.3    Ordowski, M.4    Przybocki, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.