-
1
-
-
70350125882
-
An overview of text-independent speaker recognition: From features to supervectors
-
January
-
T. Kinnunen and H. Li, "An overview of text-independent speaker recognition: from features to supervectors, " Speech Communication, vol. 52 (1), pp. 12-40, January 2010.
-
(2010)
Speech Communication
, vol.52
, Issue.1
, pp. 12-40
-
-
Kinnunen, T.1
Li, H.2
-
2
-
-
84906216788
-
-
[Online]. Available
-
"Speak to unlock, " 2012. [Online]. Available: http://www.i2r.a-star.edu.sg/files/documents/416/ BIRCBringsFirstSpeakerVerificationTechnologyIntoSmartphonesWithBuilt- InVoiceprintFeatureFinal.pdf.
-
(2012)
Speak to Unlock
-
-
-
3
-
-
79952940570
-
Detecting replay attacks from far-field recordings on speaker verification systems
-
J. Villalba and E. Lleida, "Detecting replay attacks from far-field recordings on speaker verification systems, " Biometrics and ID Management, pp. 274-285, 2011.
-
(2011)
Biometrics and ID Management
, pp. 274-285
-
-
Villalba, J.1
Lleida, E.2
-
4
-
-
84867600098
-
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
-
Kyoto, Japan, March
-
T. Kinnunen, Z.-Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech, " in Proc. ICASSP, Kyoto, Japan, March 2012, pp. 4401 - 4404.
-
(2012)
Proc. ICASSP
, pp. 4401-4404
-
-
Kinnunen, T.1
Wu, Z.-Z.2
Lee, K.A.3
Sedlak, F.4
Chng, E.S.5
Li, H.6
-
5
-
-
84906233506
-
Evaluation of the vulnerability of speaker verification to synthetic speech
-
Brno, Czech Republic, June, (paper 28)
-
P. DeLeon, M. Pucher, and J. Yamagishi, "Evaluation of the vulnerability of speaker verification to synthetic speech, " in Odyssey 2010: The Speaker and Language Recognition Workshop, Brno, Czech Republic, June 2010, pp. 151-158 (paper 28).
-
(2010)
Odyssey 2010: The Speaker and Language Recognition Workshop
, pp. 151-158
-
-
Deleon, P.1
Pucher, M.2
Yamagishi, J.3
-
6
-
-
77956826012
-
Automatic speaker recognition as a measurement of voice imitation and conversion
-
M. Farrus, M. Wagner, D. Erro, and F. J. Hernando, "Automatic speaker recognition as a measurement of voice imitation and conversion, " The Int. Journal of Speech, Language and the Law, vol. 1, no. 17, pp. 119-142, 2010.
-
(2010)
The Int. Journal of Speech, Language and the Law
, vol.1
, Issue.17
, pp. 119-142
-
-
Farrus, M.1
Wagner, M.2
Erro, D.3
Hernando, F.J.4
-
7
-
-
39149103755
-
Voice disguise and automatic detection: Review and perspectives
-
ser. Lecture Notes in Computer Science
-
P. Perrot, G. Aversano, and G. Chollet, "Voice disguise and automatic detection: Review and perspectives, " in Progress in Nonlinear Speech Processing, ser. Lecture Notes in Computer Science, 2007, pp. 101-117.
-
(2007)
Progress in Nonlinear Speech Processing
, pp. 101-117
-
-
Perrot, P.1
Aversano, G.2
Chollet, G.3
-
8
-
-
38149118064
-
Detection of speaker characteristics using voice imitation
-
ser. Lecture Notes in Computer Science
-
E. Zetterholm, "Detection of speaker characteristics using voice imitation, " in Speaker Classification II, ser. Lecture Notes in Computer Science, 2007, pp. 192-205.
-
(2007)
Speaker Classification II
, pp. 192-205
-
-
Zetterholm, E.1
-
9
-
-
27544482501
-
Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification
-
Jan
-
A. Ogihara, H. Unno, and A. Shiozaki, "Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification, " IEICE Trnas. Fundamentals, vol. E88-A, no. 1, pp. 280-286, Jan. 2005.
-
(2005)
IEICE Trnas. Fundamentals
, vol.E88-A
, Issue.1
, pp. 280-286
-
-
Ogihara, A.1
Unno, H.2
Shiozaki, A.3
-
10
-
-
84874448812
-
A study on spoofing attack in state-of-the-art speaker verification: The telephone speech case
-
Hollywood, USA, December
-
Z. Wu, T. Kinnunen, E. Chng, H. Li, and E. Ambikairajah, "A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case, " in Proc. 2012 Asia-Pacific Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC 2012), Hollywood, USA, December 2012, pp. 1-5.
-
(2012)
Proc. 2012 Asia-Pacific Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC 2012)
, pp. 1-5
-
-
Wu, Z.1
Kinnunen, T.2
Chng, E.3
Li, H.4
Ambikairajah, E.5
-
11
-
-
14544274085
-
Vulnerability of speaker verification to voice mimicking
-
Hong Kong, October
-
Y. Lau, M. Wagner, and D. Tran, "Vulnerability of speaker verification to voice mimicking, " in Proc. Int. Symp on Intelligent Multimedia, Video & Speech Processing (ISIMP'2004), Hong Kong, October 2004, pp. 145-148.
-
(2004)
Proc. Int. Symp on Intelligent Multimedia, Video & Speech Processing (ISIMP'2004)
, pp. 145-148
-
-
Lau, Y.1
Wagner, M.2
Tran, D.3
-
12
-
-
33745309698
-
Testing voice mimicry with the YOHO speaker verification corpus
-
Melbourne, Australia, September
-
Y. Lau, D. Tran, and M. Wagner, "Testing voice mimicry with the YOHO speaker verification corpus, " in Knowledge-Based Intelligent Information and Engineering Systems (KES 2005), Melbourne, Australia, September 2005, pp. 15-21.
-
(2005)
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)
, pp. 15-21
-
-
Lau, Y.1
Tran, D.2
Wagner, M.3
-
13
-
-
84928920684
-
Can a professional imitator fool a GMM-based speaker verification system?
-
J. Mariethoz and S. Bengio, "Can a professional imitator fool a gmm-based speaker verification system?" IDIAP, Idiap-RR, 2005.
-
(2005)
IDIAP, IDIAP-RR
-
-
Mariethoz, J.1
Bengio, S.2
-
15
-
-
33947637189
-
Joint factor analysis of speaker and session variability: Theory and algorithms
-
Montreal, CRIM
-
P. Kenny, "Joint factor analysis of speaker and session variability: theory and algorithms, " technical report CRIM-06/08-14, Montreal, CRIM, 2006.
-
(2006)
Technical Report CRIM-06/08-14
-
-
Kenny, P.1
-
16
-
-
0033884858
-
Speaker verification using adapted gaussian mixture models
-
Jan
-
D. Reynolds, T. Quatieri, and R. Dunn, "Speaker verification using adapted Gaussian mixture models, " DSP, vol. 10, no. 1, pp. 19-41, Jan 2000.
-
(2000)
DSP
, vol.10
, Issue.1
, pp. 19-41
-
-
Reynolds, D.1
Quatieri, T.2
Dunn, R.3
-
17
-
-
79951609039
-
Front-end factor analysis for speaker verification
-
May
-
N. Dehak, P. Kenny, R. Dehak, P. Dumouchel, and P. Ouellet, "Front-end factor analysis for speaker verification, " ITASLP, vol. 19, no. 4, pp. 788-798, May 2011.
-
(2011)
ITASLP
, vol.19
, Issue.4
, pp. 788-798
-
-
Dehak, N.1
Kenny, P.2
Dehak, R.3
Dumouchel, P.4
Ouellet, P.5
-
18
-
-
0032664931
-
An experimental study of speaker verification sensitivity to computer voice-altered imposters
-
Phoenix, Arizona, USA, March
-
B. Pellom and J. Hansen, "An experimental study of speaker verification sensitivity to computer voice-altered imposters, " in ICASSP, Phoenix, Arizona, USA, March 1999, pp. 837-840.
-
(1999)
ICASSP
, pp. 837-840
-
-
Pellom, B.1
Hansen, J.2
-
19
-
-
84890503314
-
Evaluation of mimicked speech using prosodic features
-
Vancouver, May
-
L. Mary, A. B. K. K. A. Joseph, and G. M. George, "Evaluation of mimicked speech using prosodic features, " in ICASSP 2013, Vancouver, May 2013, pp. 7189 - 7193.
-
(2013)
ICASSP 2013
, pp. 7189-7193
-
-
Mary, L.1
Joseph, A.B.K.K.A.2
George, G.M.3
-
20
-
-
84865733857
-
Analysis of I-vector length normalization in speaker recognition systems
-
Florence, Italy, August
-
D. Garcia-Romero and C. Y. Espy-Wilson, "Analysis of i-vector length normalization in speaker recognition systems, " in Interspeech 2011, Florence, Italy, August 2011, pp. 249-252.
-
(2011)
Interspeech 2011
, pp. 249-252
-
-
Garcia-Romero, D.1
Espy-Wilson, C.Y.2
-
21
-
-
85028060103
-
Cosine similarity scoring without score normalization techniques
-
N. Dehak, R. Dehak, J. Glass, D. Reynolds, and P. Kenny, "Cosine similarity scoring without score normalization techniques, " in Proc. Odyssey Speaker and Language Recognition Workshop, 2010.
-
(2010)
Proc. Odyssey Speaker and Language Recognition Workshop
-
-
Dehak, N.1
Dehak, R.2
Glass, J.3
Reynolds, D.4
Kenny, P.5
|