메뉴 건너뛰기




Volumn , Issue , 2013, Pages 940-944

A new speaker verification spoofing countermeasure based on Local Binary Patterns

Author keywords

Biometrics; Countermeasures; Imposture; Local Binary Patterns; Speaker verification

Indexed keywords

BIOMETRICS; RADAR COUNTERMEASURES; SPEECH PROCESSING; SPEECH SYNTHESIS;

EID: 84906244272     PISSN: 2308457X     EISSN: 19909772     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (43)

References (35)
  • 1
    • 84890478111 scopus 로고    scopus 로고
    • Speaker verification scores and acoustic analysis of a professional impersonator
    • M. Blomberg, D. Elenius, and E. Zetterholm, "Speaker verification scores and acoustic analysis of a professional impersonator, " in Proc. FONETIK, 2004.
    • (2004) Proc. FONETIK
    • Blomberg, M.1    Elenius, D.2    Zetterholm, E.3
  • 4
    • 84867605072 scopus 로고    scopus 로고
    • Speaker verification performance degradation against spoofing and tampering attacks
    • J. Villalba and E. Lleida, "Speaker verification performance degradation against spoofing and tampering attacks, " in FALA workshop, 2010, pp. 131-134.
    • (2010) FALA Workshop , pp. 131-134
    • Villalba, J.1    Lleida, E.2
  • 5
    • 85135274466 scopus 로고    scopus 로고
    • On the security of HMM-based speaker verification systems against imposture using synthetic speech
    • T. Masuko, T. Hitotsumatsu, K. Tokuda, and T. Kobayashi, "On the security of HMM-based speaker verification systems against imposture using synthetic speech, " in Proc. EUROSPEECH, 1999.
    • (1999) Proc. EUROSPEECH
    • Masuko, T.1    Hitotsumatsu, T.2    Tokuda, K.3    Kobayashi, T.4
  • 6
    • 84906233506 scopus 로고    scopus 로고
    • Evaluation of the vulnerability of speaker verification to synthetic speech
    • P. De Leon, M. Pucher, and J. Yamagishi, "Evaluation of the vulnerability of speaker verification to synthetic speech, " in Proc. Odyssey IEEE Workshop, 2010.
    • (2010) Proc. Odyssey IEEE Workshop
    • De Leon, P.1    Pucher, M.2    Yamagishi, J.3
  • 7
    • 0032664931 scopus 로고    scopus 로고
    • An experimental study of speaker verification sensitivity to computer voice-altered imposters
    • B. Pellom and J. Hansen, "An experimental study of speaker verification sensitivity to computer voice-altered imposters, " in Proc. ICASSP, vol. 2, 1999, pp. 837-840.
    • (1999) Proc. ICASSP , vol.2 , pp. 837-840
    • Pellom, B.1    Hansen, J.2
  • 8
    • 33646787422 scopus 로고    scopus 로고
    • Voice forgery using ALISP : Indexation in a client memory
    • P. Perrot, G. Aversano, R. Blouet, M. Charbit, and G. Chollet, "Voice forgery using ALISP : Indexation in a Client Memory, " in Proc. ICASSP, vol. 1, 2005, pp. 17 - 20.
    • (2005) Proc. ICASSP , vol.1 , pp. 17-20
    • Perrot, P.1    Aversano, G.2    Blouet, R.3    Charbit, M.4    Chollet, G.5
  • 9
    • 84890488624 scopus 로고    scopus 로고
    • Effect of impostor speech transformation on automatic speaker recognition
    • D. Matrouf, J. Bonastre, and J. Costa, "Effect of impostor speech transformation on automatic speaker recognition, " Biometrics on the Internet, p. 37, 2005.
    • (2005) Biometrics on the Internet , pp. 37
    • Matrouf, D.1    Bonastre, J.2    Costa, J.3
  • 10
    • 84867600098 scopus 로고    scopus 로고
    • Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
    • T. Kinnunen, Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of Speaker Verification Systems Against Voice Conversion Spoofing Attacks: the case of Telephone Speech, " in Proc. ICASSP, 2012, pp. 4401-4404.
    • (2012) Proc. ICASSP , pp. 4401-4404
    • Kinnunen, T.1    Wu, Z.2    Lee, K.A.3    Sedlak, F.4    Chng, E.S.5    Li, H.6
  • 11
    • 84890508341 scopus 로고    scopus 로고
    • On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
    • F. Alegre, R. Vipperla, N. Evans, and B. Fauve, "On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals, " in Proc. 12th EUSIPCO, 2012.
    • (2012) thEUSIPCO
    • Alegre, F.1    Vipperla, R.2    Evans, N.3    Fauve, B.4
  • 12
    • 84866664927 scopus 로고    scopus 로고
    • Face spoofing detection from single images using texture and local shape analysis
    • J. Maatta, A. Hadid, and M. Pietikainen, "Face spoofing detection from single images using texture and local shape analysis, " Biometrics, IET, vol. 1, no. 1, pp. 3-10, 2012.
    • (2012) Biometrics, IET , vol.1 , Issue.1 , pp. 3-10
    • Maatta, J.1    Hadid, A.2    Pietikainen, M.3
  • 14
    • 84878410960 scopus 로고    scopus 로고
    • Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition
    • Z. Wu, E. Chng, and H. Li, "Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition, " in Proc. 13th Interspeech, 2012.
    • (2012) th Interspeech
    • Wu, Z.1    Chng, E.2    Li, H.3
  • 18
    • 84878402831 scopus 로고    scopus 로고
    • Synthetic speech discrimination using pitch pattern statistics derived from image analysis
    • P. De Leon, B. Stewart, and J. Yamagishi, "Synthetic speech discrimination using pitch pattern statistics derived from image analysis, " in Proc. 13th Interspeech, 2012.
    • (2012) th Interspeech
    • De Leon, P.1    Stewart, B.2    Yamagishi, J.3
  • 19
    • 0036647193 scopus 로고    scopus 로고
    • Multiresolution grayscale and rotation invariant texture classification with local binary patterns
    • T. Ojala, M. Pietikainen, and T. Maenpaa, "Multiresolution grayscale and rotation invariant texture classification with local binary patterns, " Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 971-987, 2002.
    • (2002) Transactions on Pattern Analysis and Machine Intelligence , vol.24 , Issue.7 , pp. 971-987
    • Ojala, T.1    Pietikainen, M.2    Maenpaa, T.3
  • 21
    • 84890542394 scopus 로고    scopus 로고
    • Spoofing countermeasures to protect automatic speaker verification from voice conversion
    • in To appear in
    • F. Alegre, A. Amehraye, and N. Evans, "Spoofing countermeasures to protect automatic speaker verification from voice conversion, " in To appear in Acoustics, Speech and Signal Processing (ICASSP), 2013.
    • (2013) Acoustics, Speech and Signal Processing (ICASSP)
    • Alegre, F.1    Amehraye, A.2    Evans, N.3
  • 22
    • 42749108248 scopus 로고    scopus 로고
    • Transfer functionbased voice transformation for speaker recognition
    • J. Bonastre, D. Matrouf, and C. Fredouille, "Transfer functionbased voice transformation for speaker recognition, " in Proc. Odyssey IEEE Workshop, 2006, pp. 1-6.
    • (2006) Proc. Odyssey IEEE Workshop , pp. 1-6
    • Bonastre, J.1    Matrouf, D.2    Fredouille, C.3
  • 23
    • 65349113532 scopus 로고    scopus 로고
    • Artificial impostor voice transformation effects on false acceptance rates
    • J.-F. Bonastre, D. Matrouf, and C. Fredouille, "Artificial impostor voice transformation effects on false acceptance rates, " in Proc. Interspeech, 2007, pp. 2053-2056.
    • (2007) Proc. Interspeech , pp. 2053-2056
    • Bonastre, J.-F.1    Matrouf, D.2    Fredouille, C.3
  • 25
    • 67650854725 scopus 로고    scopus 로고
    • Analysis of speaker adaptation algorithms for HMM-based speech synthesis and a constrained SMAPLR adaptation algorithm
    • J. Yamagishi, T. Kobayashi, Y. Nakano, K. Ogata, and J. Isogai, "Analysis of Speaker Adaptation Algorithms for HMM-based Speech Synthesis and a Constrained SMAPLR Adaptation Algorithm, " IEEE transactions on Audio, Speech & Language Processing, vol. 17, no. 1, pp. 66-83, 2009.
    • (2009) IEEE Transactions on Audio, Speech & Language Processing , vol.17 , Issue.1 , pp. 66-83
    • Yamagishi, J.1    Kobayashi, T.2    Nakano, Y.3    Ogata, K.4    Isogai, J.5
  • 26
    • 0032673049 scopus 로고    scopus 로고
    • Restructuring speech representations using a pitch-adaptive time- frequency smoothing and an instantaneous-frequency-based f0 extraction: Possible role of a repetitive structure in sounds
    • H. Kawahara, I. Masuda-Katsuse, and A. de Cheveigne, "Restructuring speech representations using a pitch-adaptive time- frequency smoothing and an instantaneous-frequency-based f0 extraction: Possible role of a repetitive structure in sounds, " Speech communication, vol. 27, no. 3, pp. 187-207, 1999.
    • (1999) Speech Communication , vol.27 , Issue.3 , pp. 187-207
    • Kawahara, H.1    Masuda-Katsuse, I.2    De Cheveigne, A.3
  • 27
    • 84855921650 scopus 로고    scopus 로고
    • A fast parts-based approach to speaker verification using boosted slice classifiers
    • A. Roy, M. Magimai-Doss, and S. Marcel, "A fast parts-based approach to speaker verification using boosted slice classifiers, " IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 241-254, 2012.
    • (2012) IEEE Transactions on Information Forensics and Security , vol.7 , Issue.1 , pp. 241-254
    • Roy, A.1    Magimai-Doss, M.2    Marcel, S.3
  • 28
    • 56149126578 scopus 로고    scopus 로고
    • A straightforward and efficient implementation of the factor analysis model for speaker verification
    • D. Matrouf, N. Scheffer, B. Fauve, and J.-F. Bonastre, "A straightforward and efficient implementation of the factor analysis model for speaker verification, " in Proc. Interspeech, 2007.
    • (2007) Proc. Interspeech
    • Matrouf, D.1    Scheffer, N.2    Fauve, B.3    Bonastre, J.-F.4
  • 29
    • 33947696754 scopus 로고    scopus 로고
    • Svm based speaker verification using a gmm supervector kernel and nap variability compensation
    • may
    • W. Campbell, D. Sturim, D. Reynolds, and A. Solomonoff, "Svm based speaker verification using a gmm supervector kernel and nap variability compensation, " in Proc. ICASSP, vol. 1, may 2006, p. 1.
    • (2006) Proc. ICASSP , vol.1 , pp. 1
    • Campbell, W.1    Sturim, D.2    Reynolds, D.3    Solomonoff, A.4
  • 32
    • 84869758839 scopus 로고    scopus 로고
    • Nist'04 speaker recognition evaluation campaign: New LIA speaker detection platform based on alize toolkit
    • J.-F. Bonastre, N. Scheffer, C. Fredouille, and D. Matrouf, "NIST'04 speaker recognition evaluation campaign: new LIA speaker detection platform based on ALIZE toolkit, " in NIST SRE'04, 2004.
    • (2004) NIST SRE'04
    • Bonastre, J.-F.1    Scheffer, N.2    Fredouille, C.3    Matrouf, D.4
  • 34
    • 84878412793 scopus 로고    scopus 로고
    • Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals
    • F. Alegre, R. Vipperla, and N. Evans, "Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals, " in Proc. 13th Interspeech, 2012.
    • (2012) Proc. 13th Interspeech
    • Alegre, F.1    Vipperla, R.2    Evans, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.