-
1
-
-
84890478111
-
Speaker verification scores and acoustic analysis of a professional impersonator
-
M. Blomberg, D. Elenius, and E. Zetterholm, "Speaker verification scores and acoustic analysis of a professional impersonator," in Proc. F ONETIK, 2004.
-
(2004)
Proc. F ONETIK
-
-
Blomberg, M.1
Elenius, D.2
Zetterholm, E.3
-
2
-
-
84893210778
-
How vulnerable are prosodic features to professional imitators?
-
M. Farrus, M. Wagner, J. Anguita, and J. Hern, "How vulnerable are prosodic features to professional imitators?," in Proc. Odyssey IEEE Workshop, 2008.
-
(2008)
Proc. Odyssey IEEE Workshop
-
-
Farrus, M.1
Wagner, M.2
Anguita, J.3
Hern, J.4
-
4
-
-
84867605072
-
Speaker verification performance degradation against spoofing and tampering attacks
-
J. Villalba and E. Lleida, "Speaker verification performance degradation against spoofing and tampering attacks," in FAlA workshop, 2010, pp. 131-134.
-
(2010)
FAlA Workshop
, pp. 131-134
-
-
Villalba, J.1
Lleida, E.2
-
5
-
-
0032664931
-
An experimental study of speaker verification sensitivity to computer voice-altered imposters
-
B.L. Pellom and J.H.L. Hansen, "An experimental study of speaker verification sensitivity to computer voice-altered imposters," in Proc. ICASSP, 1999, vol. 2, pp. 837-840.
-
(1999)
Proc. ICASSP
, vol.2
, pp. 837-840
-
-
Pellom, B.L.1
Hansen, J.H.L.2
-
6
-
-
33646787422
-
Voice forgery using ALISP: Indexation in a Client Memory
-
P. Perrot, G. Aversano, R. Blouet, M. Charbit, and G. Chollet, "Voice forgery using ALISP: Indexation in a Client Memory," in Proc. ICASSP, 2005, vol. 1, pp. 17-20.
-
(2005)
Proc. ICASSP
, vol.1
, pp. 17-20
-
-
Perrot, P.1
Aversano, G.2
Blouet, R.3
Charbit, M.4
Chollet, G.5
-
7
-
-
84890488624
-
Effect of impostor speech transformation on automatic speaker recognition
-
D. Matrouf, J.F. Bonastre, and J.P. Costa, "Effect of impostor speech transformation on automatic speaker recognition," Biometrics on the Internet, p. 37, 2005.
-
(2005)
Biometrics on the Internet
, pp. 37
-
-
Matrouf, D.1
Bonastre, J.F.2
Costa, J.P.3
-
8
-
-
84867600098
-
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
-
T. Kinnunen, Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of Speaker Verification Systems Against Voice Conversion Spoofing Attacks: the case of Telephone Speech," in Proc. ICASSP, 2012, pp. 4401-4404.
-
(2012)
Proc. ICASSP
, pp. 4401-4404
-
-
Kinnunen, T.1
Wu, Z.2
Lee, K.A.3
Sedlak, F.4
Chng, E.S.5
Li, H.6
-
9
-
-
85135274466
-
On the security of HMM-based speaker verification systems against imposture using synthetic speech
-
T. Masuko, T. Hitotsumatsu, K. Tokuda, and T. Kobayashi, "On the security of HMM-based speaker verification systems against imposture using synthetic speech," in Proc. EUROSPEECH, 1999.
-
(1999)
Proc. EUROSPEECH
-
-
Masuko, T.1
Hitotsumatsu, T.2
Tokuda, K.3
Kobayashi, T.4
-
11
-
-
84890508341
-
On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
-
F. Alegre, R. Vipperla, N. Evans, and B. Fauve, "On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals," in Proc. 12th EUSIPCO, 2012.
-
(2012)
Proc. 12th EUSIPCO
-
-
Alegre, F.1
Vipperla, R.2
Evans, N.3
Fauve, B.4
-
12
-
-
84866664927
-
Face spoofing detection from single images using texture and local shape analysis
-
J. Miiiittii, A. Hadid, and M. Pietikiiinen, "Face spoofing detection from single images using texture and local shape analysis," Biometrics, lET, vol. 1, no. 1, pp. 3-10, 2012.
-
(2012)
Biometrics, LET
, vol.1
, Issue.1
, pp. 3-10
-
-
Miiiittii, J.1
Hadid, A.2
Pietikiiinen, M.3
-
13
-
-
84862953522
-
Competition on counter measures to 2-d facial spoofing attacks
-
M.M. Chakka, A. Anjos, S. Marcel, R. Tronci, D. Muntoni, G. Fadda, M. Pili, N. Sirena, G. Murgia, M. Ristori, et al., "Competition on counter measures to 2-d facial spoofing attacks," in Proc. IEEE International Joint Conference on Biometrics (fJCB), 2011, pp. 1-6.
-
(2011)
Proc. IEEE International Joint Conference on Biometrics (FJCB)
, pp. 1-6
-
-
Chakka, M.M.1
Anjos, A.2
Marcel, S.3
Tronci, R.4
Muntoni, D.5
Fadda, G.6
Pili, M.7
Sirena, N.8
Murgia, G.9
Ristori, M.10
-
14
-
-
84890482747
-
-
F. Alegre, X. Zhao, N. Evans, J. Bustard, M. Nixon, A. Hadid, W. Ketchantang, S. Picard, S. Revelin, A. Riera, et al., "Tabula rasa trusted biometrics under spoofing attacks,".
-
Tabula Rasa Trusted Biometrics under Spoofing Attacks
-
-
Alegre, F.1
Zhao, X.2
Evans, N.3
Bustard, J.4
Nixon, M.5
Hadid, A.6
Ketchantang, W.7
Picard, S.8
Revelin, S.9
Riera, A.10
-
15
-
-
27544482501
-
Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification
-
A. Ogihara and A. Shiozaki, "Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification," IEICE Transactions on F undamentals of Electronics, Communications and Computer Sciences, vol. 88, no. 1, pp. 280-286, 2005.
-
(2005)
IEICE Transactions on F Undamentals of Electronics, Communications and Computer Sciences
, vol.88
, Issue.1
, pp. 280-286
-
-
Ogihara, A.1
Shiozaki, A.2
-
16
-
-
80051658143
-
Detection of synthetic speech for the problem of imposture
-
P.L. De Leon, I. Hernaez, I. Saratxaga, M. Pucher, and J. Yamagishi, "Detection of synthetic speech for the problem of imposture," in Proc. ICASSP, 2011, pp. 4844-4847.
-
(2011)
Proc. ICASSP
, pp. 4844-4847
-
-
De Leon, P.L.1
Hernaez, I.2
Saratxaga, I.3
Pucher, M.4
Yamagishi, J.5
-
17
-
-
84878402831
-
Synthetic speech discrimination using pitch pattern statistics derived from image analysis
-
P.L. De Leon, B. Stewart, and J. Yamagishi, "Synthetic speech discrimination using pitch pattern statistics derived from image analysis," in Proc. 13th Interspeech, 2012.
-
(2012)
Proc. 13th Interspeech
-
-
De Leon, P.L.1
Stewart, B.2
Yamagishi, J.3
-
18
-
-
84878410960
-
Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition
-
Z. Wu, E.S. Chng, and H. Li, "Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition," in Proc. 13th Interspeech, 2012.
-
(2012)
Proc. 13th Interspeech
-
-
Wu, Z.1
Chng, E.S.2
Li, H.3
-
19
-
-
84874448812
-
A study on spoofing attack in state-of-the-art speaker verification: The telephone speech case
-
2012 Asia-Pacific. IEEE
-
Z. Wu, T. Kinnunen, E.S. Chng, H. Li, and E. Ambikairajah, "A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case," in Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012 Asia-Pacific. IEEE, 2012, pp. 1-5.
-
(2012)
Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC)
, pp. 1-5
-
-
Wu, Z.1
Kinnunen, T.2
Chng, E.S.3
Li, H.4
Ambikairajah, E.5
-
20
-
-
84878412793
-
Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals
-
F. Alegre, R. Vipperla, and N. Evans, "Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals," in Proc. 13th Interspeech, 2012.
-
(2012)
Proc. 13th Interspeech
-
-
Alegre, F.1
Vipperla, R.2
Evans, N.3
-
21
-
-
42749108248
-
Transfer function-based voice transformation for speaker recognition
-
J.F. Bonastre, D. Matrouf, and C. Fredouille, "Transfer function-based voice transformation for speaker recognition," in Proc. Odyssey IEEE Workshop, 2006, pp. 1-6.
-
(2006)
Proc. Odyssey IEEE Workshop
, pp. 1-6
-
-
Bonastre, J.F.1
Matrouf, D.2
Fredouille, C.3
-
22
-
-
65349113532
-
Artificial impostor voice transformation effects on false acceptance rates
-
J.-F. Bonastre, D. Matrouf, and C. Fredouille, "Artificial impostor voice transformation effects on false acceptance rates," in Proc. Interspeech, 2007, pp. 2053-2056.
-
(2007)
Proc. Interspeech
, pp. 2053-2056
-
-
Bonastre, J.-F.1
Matrouf, D.2
Fredouille, C.3
-
23
-
-
0033884858
-
Speaker verification using adapted gaussian mixture models
-
D. A. Reynolds, T. F. Quatieri, and R. B. Dunn, "Speaker verification using adapted gaussian mixture models," Digital Signal Processing, vol. 10, no. 1-3, pp. 19-41, 2000.
-
(2000)
Digital Signal Processing
, vol.10
, Issue.1-3
, pp. 19-41
-
-
Reynolds, D.A.1
Quatieri, T.F.2
Dunn, R.B.3
-
24
-
-
85084012167
-
Alize/spkdet: A state-of-the-art open source software for speaker recognition
-
J.F. Bonastre, N. Scheffer, D. Matrouf, C. Fredouille, A. Larcher, A. Preti, G. Pouchoulin, N. Evans, B. Fauve, and J. Mason, "Alize/spkdet: a state-of-the-art open source software for speaker recognition," in Proc. Odyssey IEEE Workshop, 2008, vol. 5, p. 1.
-
(2008)
Proc. Odyssey IEEE Workshop
, vol.5
, pp. 1
-
-
Bonastre, J.F.1
Scheffer, N.2
Matrouf, D.3
Fredouille, C.4
Larcher, A.5
Preti, A.6
Pouchoulin, G.7
Evans, N.8
Fauve, B.9
Mason, J.10
-
25
-
-
84869758839
-
NIST'04 speaker recognition evaluation campaign: New LI A speaker detection platform based on ALIZE toolkit
-
J.-F. Bonastre, N. Scheffer, C. Fredouille, and D. Matrouf, "NIST'04 speaker recognition evaluation campaign: new LI A speaker detection platform based on ALIZE toolkit," in NIST SRE'04, 2004.
-
(2004)
NIST SRE'04
-
-
Bonastre, J.-F.1
Scheffer, N.2
Fredouille, C.3
Matrouf, D.4
-
26
-
-
62349123881
-
State-of-the-art performance in textindependent speaker verification through open-source software
-
B. G. B. Fauve, D. Matrouf, N. Scheffer, J.-F. Bonastre, and J. S. D. Mason, "State-of-the-art performance in textindependent speaker verification through open-source software," IEEE Transactions on Audio Speech and Language processing, vol. 15, no. 7, pp. 1960-1968, 2007.
-
(2007)
IEEE Transactions on Audio Speech and Language Processing
, vol.15
, Issue.7
, pp. 1960-1968
-
-
Fauve, B.G.B.1
Matrouf, D.2
Scheffer, N.3
Bonastre, J.-F.4
Mason, J.S.D.5
-
28
-
-
56149126578
-
A straightforward and efficient implementation of the factor analysis model for speaker verification
-
D. Matrouf, N. Scheffer, B. Fauve, and J.-F. Bonastre, "A straightforward and efficient implementation of the factor analysis model for speaker verification," in Proc. Interspeech, 2007.
-
(2007)
Proc. Interspeech
-
-
Matrouf, D.1
Scheffer, N.2
Fauve, B.3
Bonastre, J.-F.4
-
29
-
-
33947696754
-
Svm based speaker verification using a gmm supervector kernel and nap variability compensation
-
may
-
W.M. Campbell, D.E. Sturim, D. A. Reynolds, and A. Solomonoff, "Svm based speaker verification using a gmm supervector kernel and nap variability compensation," in Proc. ICASSP, may 2006, vol. 1, p. 1.
-
(2006)
Proc. ICASSP
, vol.1
, pp. 1
-
-
Campbell, W.M.1
Sturim, D.E.2
Reynolds, D.A.3
Solomonoff, A.4
-
30
-
-
0001455934
-
A robust algorithm for pitch tracking (rapt)
-
D. Talkin, "A robust algorithm for pitch tracking (rapt)," Speech coding and synthesis, vol. 495, pp. 518, 1995.
-
(1995)
Speech Coding and Synthesis
, vol.495
, pp. 518
-
-
Talkin, D.1
|