-
1
-
-
0031233424
-
Speaker recognition: A tutorial
-
J.P. Campbell Jr, "Speaker recognition: A tutorial," Proceedings of the IEEE, vol. 85, no. 9, pp. 1437-1462, 1997.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1437-1462
-
-
Campbell Jr., J.P.1
-
2
-
-
0036293830
-
An overview of automatic speaker recognition technology
-
IEEE
-
D.A. Reynolds, "An overview of automatic speaker recognition technology," in Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. IEEE, 2002, vol. 4, pp. IV-4072.
-
(2002)
Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on
, vol.4
-
-
Reynolds, D.A.1
-
3
-
-
0032026483
-
Continuous probabilistic transform for voice conversion
-
PII S1063667698017386
-
Y. Stylianou, O. Cappé, and E. Moulines, "Continuous probabilistic transform for voice conversion," IEEE Trans. on Speech and Audio Processing, vol. 6, no. 2, pp. 131-142, March 1998. (Pubitemid 128720639)
-
(1998)
IEEE Transactions on Speech and Audio Processing
, vol.6
, Issue.2
, pp. 131-142
-
-
Stylianou, Y.1
Cappe, O.2
Moulines, E.3
-
4
-
-
0031623661
-
Spectral voice conversion for text-to-speech synthesis
-
IEEE
-
A. Kain and M.W. Macon, "Spectral voice conversion for text-to-speech synthesis," in Acoustics, Speech and Signal Processing, 1998. Proceedings of the 1998 IEEE International Conference on. IEEE, 1998, vol. 1, pp. 285-288.
-
(1998)
Acoustics, Speech and Signal Processing, 1998. Proceedings of the 1998 IEEE International Conference on
, vol.1
, pp. 285-288
-
-
Kain, A.1
Macon, M.W.2
-
5
-
-
85135261394
-
Vulnerability in speaker verification - A study of technical impostor techniques
-
J. Lindberg and M. Blomberg, "Vulnerability in speaker verification - a study of technical impostor techniques," in Proc. 6th European Conference on Speech Communication and Technology (Eurospeech 1999), Budapest, Hungary, September 1999, pp. 1211-1214.
-
Proc. 6th European Conference on Speech Communication and Technology (Eurospeech 1999), Budapest, Hungary, September 1999
, pp. 1211-1214
-
-
Lindberg, J.1
Blomberg, M.2
-
6
-
-
84867605072
-
Speaker verification performance degradation against spoofing and tampering attacks
-
Jesús Villalba and Eduardo Lleida, "Speaker verification performance degradation against spoofing and tampering attacks," in FALA 10 workshop, 2010, pp. 131-134.
-
FALA 10 Workshop, 2010
, pp. 131-134
-
-
Villalba, J.1
Lleida, E.2
-
7
-
-
85009119461
-
A robust speaker verification system against imposture using a HMM-based speech synthesis system
-
T. Satoh, T. Masuko, T. Kobayashi, and K. Tokuda, "A robust speaker verification system against imposture using a HMM-based speech synthesis system," in Proc. 7th European Conference on Speech Communication and Technology (Eurospeech 2001), Aalborg, Denmark, September 2001, pp. 759-762.
-
Proc. 7th European Conference on Speech Communication and Technology (Eurospeech 2001), Aalborg, Denmark, September 2001
, pp. 759-762
-
-
Satoh, T.1
Masuko, T.2
Kobayashi, T.3
Tokuda, K.4
-
8
-
-
0032664931
-
-
Phoenix, Arizona, USA, March
-
B.L. Pellom and J.H.L. Hansen, "An experimental study of speaker verification sensitivity to computer voice-altered imposters," Phoenix, Arizona, USA, March 1999, pp. 837-840.
-
(1999)
An Experimental Study of Speaker Verification Sensitivity to Computer Voice-altered Imposters
, pp. 837-840
-
-
Pellom, B.L.1
Hansen, J.H.L.2
-
9
-
-
84906233506
-
Evaluation of the vulnerability of speaker verification to synthetic speech
-
(paper 28)
-
P. DeLeon, M. Pucher, and J. Yamagishi, "Evaluation of the vulnerability of speaker verification to synthetic speech," in Odyssey 2010: The Speaker and Language Recognition Workshop, Brno, Czech Republic, June 2010, pp. 151-158 (paper 28).
-
Odyssey 2010: The Speaker and Language Recognition Workshop, Brno, Czech Republic, June 2010
, pp. 151-158
-
-
DeLeon, P.1
Pucher, M.2
Yamagishi, J.3
-
10
-
-
65349113532
-
Artificial impostor voice transformation effects on false acceptance rates
-
J.-F. Bonastre, D. Matrouf, and C. Fredouille, "Artificial impostor voice transformation effects on false acceptance rates," in Proc. Interspeech 2007 (ICSLP), Antwerp, Belgium, August 2007, pp. 2053-2056.
-
Proc. Interspeech 2007 (ICSLP), Antwerp, Belgium, August 2007
, pp. 2053-2056
-
-
Bonastre, J.-F.1
Matrouf, D.2
Fredouille, C.3
-
11
-
-
51449115100
-
Is voice transformation a threat to speaker identification?
-
Qin Jin, Arthur Toth, Alan W. Black, and Tanja Schultz, "Is voice transformation a threat to speaker identification?," Proc. ICASSP 2008, March 2008, pp. 4845-4848.
-
Proc. ICASSP 2008, March 2008
, pp. 4845-4848
-
-
Jin, Q.1
Toth, A.2
Black, A.W.3
Schultz, T.4
-
12
-
-
70349216553
-
Voice convergin: Speaker de-identification by voice transformation
-
IEEE
-
Q. Jin, A.R. Toth, T. Schultz, and A.W. Black, "Voice convergin: Speaker de-identification by voice transformation," in Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. IEEE, 2009, pp. 3909-3912.
-
(2009)
Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on
, pp. 3909-3912
-
-
Jin, Q.1
Toth, A.R.2
Schultz, T.3
Black, A.W.4
-
13
-
-
33745309698
-
Testing voice mimicry with the YOHO speaker verification corpus
-
Y.W. Lau, D. Tran, and M. Wagner, "Testing voice mimicry with the YOHO speaker verification corpus," in Knowledge-Based Intelligent Information and Engineering Systems (KES 2005), Melbourne, Australia, September 2005, pp. 15-21.
-
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005), Melbourne, Australia, September 2005
, pp. 15-21
-
-
Lau, Y.W.1
Tran, D.2
Wagner, M.3
-
14
-
-
85084013778
-
How vulnerable are prosodic features to professional imitators?
-
M. Farrús, M. Wagner, J. Anguita, and J. Hernando, "How vulnerable are prosodic features to professional imitators?," in The Speaker and Language Recognition Workshop (Odyssey 2008), Stellenbosch, South Africa, January 2008.
-
The Speaker and Language Recognition Workshop (Odyssey 2008), Stellenbosch, South Africa, January 2008
-
-
Farrús, M.1
Wagner, M.2
Anguita, J.3
Hernando, J.4
-
15
-
-
84867600098
-
Vulnerability of Speaker Verification Systems Against Voice Conversion Spoofing Attacks: The Case of Telephone Speech
-
IEEE
-
T. Kinnunen, Z.-Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of Speaker Verification Systems Against Voice Conversion Spoofing Attacks: the Case of Telephone Speech," in Acoustics, Speech and Signal Processing, 2012. Proceedings of the 2012 IEEE International Conference on. IEEE, 2012.
-
(2012)
Acoustics, Speech and Signal Processing, 2012. Proceedings of the 2012 IEEE International Conference on
-
-
Kinnunen, T.1
Wu, Z.-Z.2
Lee, K.A.3
Sedlak, F.4
Chng, E.S.5
Li, H.6
-
16
-
-
0033884858
-
Speaker verification using adapted Gaussian mixture models
-
DOI 10.1006/dspr.1999.0361
-
D.A. Reynolds, T.F. Quatieri, and R.B. Dunn, "Speaker verification using adapted Gaussian mixture models," Digital Signal Processing, vol. 10, no. 1, pp. 19-41, January 2000. (Pubitemid 30592166)
-
(2000)
Digital Signal Processing: A Review Journal
, vol.10
, Issue.1
, pp. 19-41
-
-
Reynolds, D.A.1
Quatieri, T.F.2
Dunn, R.B.3
-
17
-
-
43249111309
-
Maximum a Posteriori estimation of the centroid model for speaker verification
-
V. Hautamki, T. Kinnunen, I. Krkkinen, M. Tuononen, J. Saastamoinen, and P. Frnti, "Maximum a Posteriori estimation of the centroid model for speaker verification," IEEE Signal Processing Letters, vol. 15, pp. 162-165, 2008.
-
(2008)
IEEE Signal Processing Letters
, vol.15
, pp. 162-165
-
-
Hautamki, V.1
Kinnunen, T.2
Krkkinen, I.3
Tuononen, M.4
Saastamoinen, J.5
Frnti, P.6
-
18
-
-
29044444825
-
Support vector machines for speaker and language recognition
-
DOI 10.1016/j.csl.2005.06.003, PII S0885230805000318, Odyssey 2004: The Speaker and Language Recognition Workshop Odyssey-04
-
W.M. Campbell, J.P. Campbell, D.A. Reynolds, E. Singer, and P.A. Torres-Carrasquillo, "Support vector machines for speaker and language recognition," Computer Speech and Language, vol. 20, no. 2-3, pp. 210-229, April 2006. (Pubitemid 41787537)
-
(2006)
Computer Speech and Language
, vol.20
, Issue.2-3 SPEC. ISS
, pp. 210-229
-
-
Campbell, W.M.1
Campbell, J.P.2
Reynolds, D.A.3
Singer, E.4
Torres-Carrasquillo, P.A.5
-
19
-
-
33645887246
-
Support vector machines using GMM supervectors for speaker verification
-
May
-
W.M. Campbell, D.E. Sturim, and D.A. Reynolds, "Support vector machines using GMM supervectors for speaker verification," IEEE Signal Processing Letters, vol. 13, no. 5, pp. 308-311, May 2006.
-
(2006)
IEEE Signal Processing Letters
, vol.13
, Issue.5
, pp. 308-311
-
-
Campbell, W.M.1
Sturim, D.E.2
Reynolds, D.A.3
-
20
-
-
80051658143
-
Detection of synthetic speech for the problem of imposture
-
P.L. De Leon, I. Hernaez, I. Saratxaga, M. Pucher, and J. Yamagishi, "Detection of synthetic speech for the problem of imposture," in ICASSP 2011.
-
ICASSP 2011
-
-
De Leon, P.L.1
Hernaez, I.2
Saratxaga, I.3
Pucher, M.4
Yamagishi, J.5
-
21
-
-
84878410960
-
Detecting Converted Speech and Natural Speech for anti-Spoofing Attack in Speaker Recognition
-
Z. Wu, E. S. Chng, and H. Li, "Detecting Converted Speech and Natural Speech for anti-Spoofing Attack in Speaker Recognition," in Interspeech, 2012.
-
(2012)
Interspeech
-
-
Wu, Z.1
Chng, E.S.2
Li, H.3
-
22
-
-
33947623206
-
Text-independent voice conversion based on unit selection
-
IEEE
-
D. Sundermann, H. Hoge, A. Bonafonte, H. Ney, A. Black, and S. Narayanan, "Text-independent voice conversion based on unit selection," in Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. IEEE, 2006, vol. 1, pp. I-I.
-
(2006)
Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on
, vol.1
-
-
Sundermann, D.1
Hoge, H.2
Bonafonte, A.3
Ney, H.4
Black, A.5
Narayanan, S.6
-
25
-
-
0003571976
-
-
S. Young, G. Evermann, M. Gales, T. Hain, D. Kershaw, XA Liu, G. Moore, J. Odell, D. Ollason, D. Povey, et al., "The htk book (for htk version 3.4)," 2006.
-
(2006)
The Htk Book (For Htk Version 3.4)
-
-
Young, S.1
Evermann, G.2
Gales, M.3
Hain, T.4
Kershaw, D.5
Liu, X.A.6
Moore, G.7
Odell, J.8
Ollason, D.9
Povey, D.10
-
26
-
-
79951609039
-
Front-end factor analysis for speaker verification
-
N. Dehak, P.J. Kenny, R. Dehak, P. Dumouchel, and P. Ouellet, "Front-end factor analysis for speaker verification," Audio, Speech, and Language Processing, IEEE Transactions on, vol. 19, no. 4, pp. 788-798, 2011.
-
(2011)
Audio, Speech, and Language Processing, IEEE Transactions on
, vol.19
, Issue.4
, pp. 788-798
-
-
Dehak, N.1
Kenny, P.J.2
Dehak, R.3
Dumouchel, P.4
Ouellet, P.5
-
28
-
-
77953725318
-
Inca algorithm for training voice conversion systems from nonparallel corpora
-
D. Erro, A. Moreno, and A. Bonafonte, "Inca algorithm for training voice conversion systems from nonparallel corpora," Audio, Speech, and Language Processing, IEEE Transactions on, vol. 18, no. 5, pp. 944-953, 2010.
-
(2010)
Audio, Speech, and Language Processing, IEEE Transactions on
, vol.18
, Issue.5
, pp. 944-953
-
-
Erro, D.1
Moreno, A.2
Bonafonte, A.3
-
29
-
-
0141480080
-
The modified group delay function and its application to phoneme recognition
-
IEEE
-
H.A. Murthy and V. Gadde, "The modified group delay function and its application to phoneme recognition," in Acoustics, Speech, and Signal Processing, 2003. Proceedings.(ICASSP'03). 2003 IEEE International Conference on. IEEE, 2003, vol. 1, pp. I-68.
-
(2003)
Acoustics, Speech, and Signal Processing, 2003. Proceedings.(ICASSP'03). 2003 IEEE International Conference on
, vol.1
-
-
Murthy, H.A.1
Gadde, V.2
-
31
-
-
0001455934
-
A robust algorithm for pitch tracking (RAPT)
-
D. Talkin, "A robust algorithm for pitch tracking (RAPT)," Speech coding and synthesis, vol. 495, pp. 518, 1995.
-
(1995)
Speech Coding and Synthesis
, vol.495
, pp. 518
-
-
Talkin, D.1
|