-
1
-
-
3142739783
-
On the vulnerability of biometric security systems
-
june
-
M. Faundez-Zanuy, "On the vulnerability of biometric security systems," IEEE Aerospace and Electronic Systems Magazine, vol. 19, no. 6, pp. 3-8, june 2004.
-
(2004)
IEEE Aerospace and Electronic Systems Magazine
, vol.19
, Issue.6
, pp. 3-8
-
-
Faundez-Zanuy, M.1
-
2
-
-
84893210778
-
How vulnerable are prosodic features to professional imitators?
-
M. Farrs, M. Wagner, J. Anguita, and J. Hern, "How vulnerable are prosodic features to professional imitators?," in Odyssey, 2008.
-
(2008)
Odyssey
-
-
Farrs, M.1
Wagner, M.2
Anguita, J.3
Hern, J.4
-
3
-
-
84890478111
-
Speaker verification scores and acoustic analysis of a professional impersonator
-
M. Blomberg, D. Elenius, and E. Zetterholm, "Speaker verification scores and acoustic analysis of a professional impersonator," in FONETIK, 2004.
-
(2004)
FONETIK
-
-
Blomberg, M.1
Elenius, D.2
Zetterholm, E.3
-
5
-
-
84867605072
-
Speaker verification performance degradation against spoofing and tampering attacks
-
J. Villalba and E. Lleida, "Speaker verification performance degradation against spoofing and tampering attacks," in FALA workshop, 2010, pp. 131-134.
-
(2010)
FALA workshop
, pp. 131-134
-
-
Villalba, J.1
Lleida, E.2
-
6
-
-
33646787422
-
Voice forgery using alisp : Indexation in a client memory
-
P. Perrot, G. Aversano, R. Blouet, M. Charbit, and G. Chollet, "Voice forgery using ALISP : Indexation in a Client Memory," in IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005, vol. 1, pp. 17-20.
-
(2005)
IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.1
, pp. 17-20
-
-
Perrot, P.1
Aversano, G.2
Blouet, R.3
Charbit, M.4
Chollet, G.5
-
7
-
-
65349113532
-
Artificial impostor voice transformation effects on false acceptance rates
-
J.-F. Bonastre, D. Matrouf, and C. Fredouille, "Artificial impostor voice transformation effects on false acceptance rates," in Proc. Interspeech, 2007, pp. 2053-2056.
-
(2007)
Proc. Interspeech
, pp. 2053-2056
-
-
Bonastre, J.-F.1
Matrouf, D.2
Fredouille, C.3
-
8
-
-
84867600098
-
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
-
T. Kinnunen, Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of Speaker Verification Systems Against Voice Conversion Spoofing Attacks: the case of Telephone Speech," in Proc. ICASSP, 2012, pp. 4401-4404.
-
(2012)
Proc. ICASSP
, pp. 4401-4404
-
-
Kinnunen, T.1
Wu, Z.2
Lee, K.A.3
Sedlak, F.4
Chng, E.S.5
Li, H.6
-
9
-
-
85135274466
-
On the security of hmm-based speaker verification systems against imposture using synthetic speech
-
T. Masuko, T. Hitotsumatsu, K. Tokuda, and T. Kobayashi, "On the security of HMM-based speaker verification systems against imposture using synthetic speech," in EUROSPEECH, 1999.
-
(1999)
EUROSPEECH
-
-
Masuko, T.1
Hitotsumatsu, T.2
Tokuda, K.3
Kobayashi, T.4
-
10
-
-
78049409687
-
Revisiting the security of speaker verification systems against imposture using synthetic speech
-
P. L. De Leon, V. R. Apsingekar, M. Pucher, and J. Yamagishi, "Revisiting the security of speaker verification systems against imposture using synthetic speech," in IEEE International Conference on Acoustics Speech and Signal Processing, march 2010, pp. 1798-1801.
-
IEEE International Conference on Acoustics Speech and Signal Processing, march 2010
, pp. 1798-1801
-
-
De Leon, P.L.1
Apsingekar, V.R.2
Pucher, M.3
Yamagishi, J.4
-
11
-
-
4444228585
-
Genetic algorithm based rbf neural network for voice conversion
-
june
-
G. Zuo and W. Liu, "Genetic algorithm based RBF neural network for voice conversion," in Fifth World Congress on Intelligent Control and Automation, june 2004, vol. 5, pp. 4215-4218.
-
(2004)
Fifth World Congress on Intelligent Control and Automation
, vol.5
, pp. 4215-4218
-
-
Zuo, G.1
Liu, W.2
-
13
-
-
0038548330
-
The production and recognition of emotions in speech: Features and algorithms
-
P.-Y. Oudeyer, "The production and recognition of emotions in speech: Features and Algorithms," International Journal of Human-Computer Studies, vol. 59, pp. 157-183, 2003.
-
(2003)
International Journal of Human-Computer Studies
, vol.59
, pp. 157-183
-
-
Oudeyer, P.-Y.1
-
14
-
-
84869758839
-
Nist'04 speaker recognition evaluation campaign: New lia speaker detection platform based on alize toolkit
-
J.-F. Bonastre, N. Scheffer, C. Fredouille, and D. Matrouf, "NIST'04 speaker recognition evaluation campaign: new LIA speaker detection platform based on ALIZE toolkit," in NIST SRE'04, 2004.
-
(2004)
NIST SRE'04
-
-
Bonastre, J.-F.1
Scheffer, N.2
Fredouille, C.3
Matrouf, D.4
-
15
-
-
62349123881
-
State-of-the-art performance in textindependent speaker verification through open-source software
-
B. G. B. Fauve, D. Matrouf, N. Scheffer, J.-F. Bonastre, and J. S. D. Mason, "State-of-the-art performance in textindependent speaker verification through open-source software," IEEE Transactions on Audio Speech and Language processing, vol. 15, no. 7, pp. 1960-1968, 2007.
-
(2007)
IEEE Transactions on Audio Speech and Language processing
, vol.15
, Issue.7
, pp. 1960-1968
-
-
Fauve, B.G.B.1
Matrouf, D.2
Scheffer, N.3
Bonastre, J.-F.4
Mason, J.S.D.5
-
16
-
-
56149126578
-
A straightforward and efficient implementation of the factor analysis model for speaker verification
-
D. Matrouf, N. Scheffer, B. Fauve, and J.-F. Bonastre, "A straightforward and efficient implementation of the factor analysis model for speaker verification," in Proc. Interspeech, 2007.
-
(2007)
Proc. Interspeech
-
-
Matrouf, D.1
Scheffer, N.2
Fauve, B.3
Bonastre, J.-F.4
|