-
1
-
-
84890478111
-
Speaker verification scores and acoustic analysis of a professional impersonator
-
M. Blomberg, D. Elenius, and E. Zetterholm, "Speaker verification scores and acoustic analysis of a professional impersonator, " in Proc. FONETIK, 2004.
-
(2004)
Proc. FONETIK
-
-
Blomberg, M.1
Elenius, D.2
Zetterholm, E.3
-
4
-
-
84867605072
-
Speaker verification performance degradation against spoofing and tampering attacks
-
J. Villalba and E. Lleida, "Speaker verification performance degradation against spoofing and tampering attacks, " in FALA workshop, 2010, pp. 131-134.
-
(2010)
FALA Workshop
, pp. 131-134
-
-
Villalba, J.1
Lleida, E.2
-
5
-
-
85135274466
-
On the security of HMM-based speaker verification systems against imposture using synthetic speech
-
T. Masuko, T. Hitotsumatsu, K. Tokuda, and T. Kobayashi, "On the security of HMM-based speaker verification systems against imposture using synthetic speech, " in Proc. EUROSPEECH, 1999.
-
(1999)
Proc. EUROSPEECH
-
-
Masuko, T.1
Hitotsumatsu, T.2
Tokuda, K.3
Kobayashi, T.4
-
6
-
-
84906233506
-
Evaluation of the vulnerability of speaker verification to synthetic speech
-
P. De Leon, M. Pucher, and J. Yamagishi, "Evaluation of the vulnerability of speaker verification to synthetic speech, " in Proc. Odyssey IEEE Workshop, 2010.
-
(2010)
Proc. Odyssey IEEE Workshop
-
-
De Leon, P.1
Pucher, M.2
Yamagishi, J.3
-
7
-
-
0032664931
-
An experimental study of speaker verification sensitivity to computer voice-altered imposters
-
B. Pellom and J. Hansen, "An experimental study of speaker verification sensitivity to computer voice-altered imposters, " in Proc. ICASSP, vol. 2, 1999, pp. 837-840.
-
(1999)
Proc. ICASSP
, vol.2
, pp. 837-840
-
-
Pellom, B.1
Hansen, J.2
-
8
-
-
33646787422
-
Voice forgery using ALISP : Indexation in a client memory
-
P. Perrot, G. Aversano, R. Blouet, M. Charbit, and G. Chollet, "Voice forgery using ALISP : Indexation in a Client Memory, " in Proc. ICASSP, vol. 1, 2005, pp. 17 - 20.
-
(2005)
Proc. ICASSP
, vol.1
, pp. 17-20
-
-
Perrot, P.1
Aversano, G.2
Blouet, R.3
Charbit, M.4
Chollet, G.5
-
9
-
-
84890488624
-
Effect of impostor speech transformation on automatic speaker recognition
-
D. Matrouf, J. Bonastre, and J. Costa, "Effect of impostor speech transformation on automatic speaker recognition, " Biometrics on the Internet, p. 37, 2005.
-
(2005)
Biometrics on the Internet
, pp. 37
-
-
Matrouf, D.1
Bonastre, J.2
Costa, J.3
-
10
-
-
84867600098
-
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
-
T. Kinnunen, Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of Speaker Verification Systems Against Voice Conversion Spoofing Attacks: the case of Telephone Speech, " in Proc. ICASSP, 2012, pp. 4401-4404.
-
(2012)
Proc. ICASSP
, pp. 4401-4404
-
-
Kinnunen, T.1
Wu, Z.2
Lee, K.A.3
Sedlak, F.4
Chng, E.S.5
Li, H.6
-
11
-
-
84890508341
-
On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
-
F. Alegre, R. Vipperla, N. Evans, and B. Fauve, "On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals, " in Proc. 12th EUSIPCO, 2012.
-
(2012)
thEUSIPCO
-
-
Alegre, F.1
Vipperla, R.2
Evans, N.3
Fauve, B.4
-
12
-
-
84866664927
-
Face spoofing detection from single images using texture and local shape analysis
-
J. Maatta, A. Hadid, and M. Pietikainen, "Face spoofing detection from single images using texture and local shape analysis, " Biometrics, IET, vol. 1, no. 1, pp. 3-10, 2012.
-
(2012)
Biometrics, IET
, vol.1
, Issue.1
, pp. 3-10
-
-
Maatta, J.1
Hadid, A.2
Pietikainen, M.3
-
13
-
-
84862953522
-
Competition on counter measures to 2-d facial spoofing attacks
-
M. Chakka, A. Anjos, S. Marcel, R. Tronci, D. Muntoni, G. Fadda, M. Pili, N. Sirena, G. Murgia, M. Ristori et al., "Competition on counter measures to 2-d facial spoofing attacks, " in Proc. IEEE International Joint Conference on Biometrics (IJCB), 2011, pp. 1-6.
-
(2011)
Proc. IEEE International Joint Conference on Biometrics (IJCB)
, pp. 1-6
-
-
Chakka, M.1
Anjos, A.2
Marcel, S.3
Tronci, R.4
Muntoni, D.5
Fadda, G.6
Pili, M.7
Sirena, N.8
Murgia, G.9
Ristori, M.10
-
14
-
-
84878410960
-
Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition
-
Z. Wu, E. Chng, and H. Li, "Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition, " in Proc. 13th Interspeech, 2012.
-
(2012)
th Interspeech
-
-
Wu, Z.1
Chng, E.2
Li, H.3
-
15
-
-
84874448812
-
A study on spoofing attack in state-of-the-art speaker verification: The telephone speech case
-
IEEE
-
Z. Wu, T. Kinnunen, E. Chng, H. Li, and E. Ambikairajah, "A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case, " in Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012 Asia-Pacific. IEEE, 2012, pp. 1-5.
-
(2012)
Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012 Asia-Pacific
, pp. 1-5
-
-
Wu, Z.1
Kinnunen, T.2
Chng, E.3
Li, H.4
Ambikairajah, E.5
-
16
-
-
80051658143
-
Detection of synthetic speech for the problem of imposture
-
P. De Leon, I. Hernaez, I. Saratxaga, M. Pucher, and J. Yamagishi, "Detection of synthetic speech for the problem of imposture, " in Proc. ICASSP, 2011, pp. 4844-4847.
-
(2011)
Proc. ICASSP
, pp. 4844-4847
-
-
De Leon, P.1
Hernaez, I.2
Saratxaga, I.3
Pucher, M.4
Yamagishi, J.5
-
17
-
-
27544482501
-
Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification
-
A. Ogihara and A. Shiozaki, "Discrimination method of synthetic speech using pitch frequency against synthetic speech falsification, " IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 88, no. 1, pp. 280-286, 2005.
-
(2005)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.88
, Issue.1
, pp. 280-286
-
-
Ogihara, A.1
Shiozaki, A.2
-
18
-
-
84878402831
-
Synthetic speech discrimination using pitch pattern statistics derived from image analysis
-
P. De Leon, B. Stewart, and J. Yamagishi, "Synthetic speech discrimination using pitch pattern statistics derived from image analysis, " in Proc. 13th Interspeech, 2012.
-
(2012)
th Interspeech
-
-
De Leon, P.1
Stewart, B.2
Yamagishi, J.3
-
19
-
-
0036647193
-
Multiresolution grayscale and rotation invariant texture classification with local binary patterns
-
T. Ojala, M. Pietikainen, and T. Maenpaa, "Multiresolution grayscale and rotation invariant texture classification with local binary patterns, " Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 971-987, 2002.
-
(2002)
Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.7
, pp. 971-987
-
-
Ojala, T.1
Pietikainen, M.2
Maenpaa, T.3
-
20
-
-
33947167478
-
Face description with local binary patterns: Application to face recognition
-
T. Ahonen, A. Hadid, and M. Pietikainen, "Face description with local binary patterns: Application to face recognition, " Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 28, no. 12, pp. 2037-2041, 2006.
-
(2006)
Pattern Analysis and Machine Intelligence, IEEE Transactions on
, vol.28
, Issue.12
, pp. 2037-2041
-
-
Ahonen, T.1
Hadid, A.2
Pietikainen, M.3
-
21
-
-
84890542394
-
Spoofing countermeasures to protect automatic speaker verification from voice conversion
-
in To appear in
-
F. Alegre, A. Amehraye, and N. Evans, "Spoofing countermeasures to protect automatic speaker verification from voice conversion, " in To appear in Acoustics, Speech and Signal Processing (ICASSP), 2013.
-
(2013)
Acoustics, Speech and Signal Processing (ICASSP)
-
-
Alegre, F.1
Amehraye, A.2
Evans, N.3
-
22
-
-
42749108248
-
Transfer functionbased voice transformation for speaker recognition
-
J. Bonastre, D. Matrouf, and C. Fredouille, "Transfer functionbased voice transformation for speaker recognition, " in Proc. Odyssey IEEE Workshop, 2006, pp. 1-6.
-
(2006)
Proc. Odyssey IEEE Workshop
, pp. 1-6
-
-
Bonastre, J.1
Matrouf, D.2
Fredouille, C.3
-
23
-
-
65349113532
-
Artificial impostor voice transformation effects on false acceptance rates
-
J.-F. Bonastre, D. Matrouf, and C. Fredouille, "Artificial impostor voice transformation effects on false acceptance rates, " in Proc. Interspeech, 2007, pp. 2053-2056.
-
(2007)
Proc. Interspeech
, pp. 2053-2056
-
-
Bonastre, J.-F.1
Matrouf, D.2
Fredouille, C.3
-
24
-
-
85008006694
-
Robust speaker adaptive HMM based text-to-speech synthesis
-
J. Yamagishi, T. Nose, H. Zen, Z.-H. Ling, T. Toda, K. Tokuda, S. King, and S. Renals, "Robust speaker adaptive HMM based Text-to-Speech Synthesis, " IEEE Transactions on Acoustics, Speech and Signal Processing, vol. 17, no. 6, pp. 1208-1230, 2009.
-
(2009)
IEEE Transactions on Acoustics, Speech and Signal Processing
, vol.17
, Issue.6
, pp. 1208-1230
-
-
Yamagishi, J.1
Nose, T.2
Zen, H.3
Ling, Z.-H.4
Toda, T.5
Tokuda, K.6
King, S.7
Renals, S.8
-
25
-
-
67650854725
-
Analysis of speaker adaptation algorithms for HMM-based speech synthesis and a constrained SMAPLR adaptation algorithm
-
J. Yamagishi, T. Kobayashi, Y. Nakano, K. Ogata, and J. Isogai, "Analysis of Speaker Adaptation Algorithms for HMM-based Speech Synthesis and a Constrained SMAPLR Adaptation Algorithm, " IEEE transactions on Audio, Speech & Language Processing, vol. 17, no. 1, pp. 66-83, 2009.
-
(2009)
IEEE Transactions on Audio, Speech & Language Processing
, vol.17
, Issue.1
, pp. 66-83
-
-
Yamagishi, J.1
Kobayashi, T.2
Nakano, Y.3
Ogata, K.4
Isogai, J.5
-
26
-
-
0032673049
-
Restructuring speech representations using a pitch-adaptive time- frequency smoothing and an instantaneous-frequency-based f0 extraction: Possible role of a repetitive structure in sounds
-
H. Kawahara, I. Masuda-Katsuse, and A. de Cheveigne, "Restructuring speech representations using a pitch-adaptive time- frequency smoothing and an instantaneous-frequency-based f0 extraction: Possible role of a repetitive structure in sounds, " Speech communication, vol. 27, no. 3, pp. 187-207, 1999.
-
(1999)
Speech Communication
, vol.27
, Issue.3
, pp. 187-207
-
-
Kawahara, H.1
Masuda-Katsuse, I.2
De Cheveigne, A.3
-
27
-
-
84855921650
-
A fast parts-based approach to speaker verification using boosted slice classifiers
-
A. Roy, M. Magimai-Doss, and S. Marcel, "A fast parts-based approach to speaker verification using boosted slice classifiers, " IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 241-254, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.1
, pp. 241-254
-
-
Roy, A.1
Magimai-Doss, M.2
Marcel, S.3
-
28
-
-
56149126578
-
A straightforward and efficient implementation of the factor analysis model for speaker verification
-
D. Matrouf, N. Scheffer, B. Fauve, and J.-F. Bonastre, "A straightforward and efficient implementation of the factor analysis model for speaker verification, " in Proc. Interspeech, 2007.
-
(2007)
Proc. Interspeech
-
-
Matrouf, D.1
Scheffer, N.2
Fauve, B.3
Bonastre, J.-F.4
-
29
-
-
33947696754
-
Svm based speaker verification using a gmm supervector kernel and nap variability compensation
-
may
-
W. Campbell, D. Sturim, D. Reynolds, and A. Solomonoff, "Svm based speaker verification using a gmm supervector kernel and nap variability compensation, " in Proc. ICASSP, vol. 1, may 2006, p. 1.
-
(2006)
Proc. ICASSP
, vol.1
, pp. 1
-
-
Campbell, W.1
Sturim, D.2
Reynolds, D.3
Solomonoff, A.4
-
30
-
-
62349123881
-
State-of-the-art performance in text-independent speaker verification through open-source software
-
B. G. B. Fauve, D. Matrouf, N. Scheffer, J.-F. Bonastre, and J. S. D. Mason, "State-of-the-art performance in text-independent speaker verification through open-source software, " IEEE Transactions on Audio Speech and Language processing, vol. 15, no. 7, pp. 1960-1968, 2007.
-
(2007)
IEEE Transactions on Audio Speech and Language Processing
, vol.15
, Issue.7
, pp. 1960-1968
-
-
Fauve, B.G.B.1
Matrouf, D.2
Scheffer, N.3
Bonastre, J.-F.4
Mason, J.S.D.5
-
31
-
-
85084012167
-
Alize/spkdet: A state-of-the-art open source software for speaker recognition
-
J. Bonastre, N. Scheffer, D. Matrouf, C. Fredouille, A. Larcher, A. Preti, G. Pouchoulin, N. Evans, B. Fauve, and J. Mason, "Alize/spkdet: A state-of-the-art open source software for speaker recognition, " in Proc. Odyssey IEEE Workshop, vol. 5, 2008, p. 1.
-
(2008)
Proc. Odyssey IEEE Workshop
, vol.5
, pp. 1
-
-
Bonastre, J.1
Scheffer, N.2
Matrouf, D.3
Fredouille, C.4
Larcher, A.5
Preti, A.6
Pouchoulin, G.7
Evans, N.8
Fauve, B.9
Mason, J.10
-
32
-
-
84869758839
-
Nist'04 speaker recognition evaluation campaign: New LIA speaker detection platform based on alize toolkit
-
J.-F. Bonastre, N. Scheffer, C. Fredouille, and D. Matrouf, "NIST'04 speaker recognition evaluation campaign: new LIA speaker detection platform based on ALIZE toolkit, " in NIST SRE'04, 2004.
-
(2004)
NIST SRE'04
-
-
Bonastre, J.-F.1
Scheffer, N.2
Fredouille, C.3
Matrouf, D.4
-
34
-
-
84878412793
-
Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals
-
F. Alegre, R. Vipperla, and N. Evans, "Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals, " in Proc. 13th Interspeech, 2012.
-
(2012)
Proc. 13th Interspeech
-
-
Alegre, F.1
Vipperla, R.2
Evans, N.3
|