메뉴 건너뛰기




Volumn , Issue , 2014, Pages 61-65

Introducing I-vectors for joint anti-spoofing and speaker verification

Author keywords

I vector; Joint verification and anti spoofing; Speaker recognition; Spoofing; Voice conversion attack

Indexed keywords

BIOMETRICS; DISCRIMINANT ANALYSIS; SPEECH COMMUNICATION; SPEECH PROCESSING;

EID: 84910058696     PISSN: 2308457X     EISSN: 19909772     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (44)

References (32)
  • 2
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems, " IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 3
    • 84906263293 scopus 로고    scopus 로고
    • Spoofing and countermeasures for automatic speaker verification
    • N. Evans, T. Kinnunen, and J. Yamagishi, "Spoofing and countermeasures for automatic speaker verification, " in Proc. Interspeech, 2013.
    • (2013) Proc. Interspeech
    • Evans, N.1    Kinnunen, T.2    Yamagishi, J.3
  • 8
    • 65349113532 scopus 로고    scopus 로고
    • Artificial impostor voice transformation effects on false acceptance rates
    • J.-F. Bonastre, D. Matrouf, and C. Fredouille, "Artificial impostor voice transformation effects on false acceptance rates, " in Proc. Interspeech, 2007.
    • (2007) Proc. Interspeech
    • Bonastre, J.-F.1    Matrouf, D.2    Fredouille, C.3
  • 11
    • 84906234851 scopus 로고    scopus 로고
    • Voice transformation-based spoofing of text-dependent speaker verification systems
    • Z. Kons and H. Aronowitz, "Voice transformation-based spoofing of text-dependent speaker verification systems, " in Proc. Interspeech, 2013.
    • (2013) Proc. Interspeech
    • Kons, Z.1    Aronowitz, H.2
  • 14
    • 84878412793 scopus 로고    scopus 로고
    • Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals
    • F. Alegre, R. Vipperla, N. Evans et al., "Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals, " in Proc. Interspeech, 2012.
    • (2012) Proc. Interspeech
    • Alegre, F.1    Vipperla, R.2    Evans, N.3
  • 15
    • 84878410960 scopus 로고    scopus 로고
    • Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition
    • Z. Wu, E. S. Chng, and H. Li, "Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition, " in Proc. Interspeech, 2012.
    • (2012) Proc. Interspeech
    • Wu, Z.1    Chng, E.S.2    Li, H.3
  • 18
    • 84890543945 scopus 로고    scopus 로고
    • Synthetic speech detection using temporal modulation feature
    • Z. Wu, X. Xiao, E. S. Chng, and H. Li, "Synthetic speech detection using temporal modulation feature, " in ICASSP, 2013, pp. 7234-7238.
    • (2013) ICASSP , pp. 7234-7238
    • Wu, Z.1    Xiao, X.2    Chng, E.S.3    Li, H.4
  • 20
    • 85010800426 scopus 로고    scopus 로고
    • Probabilistic linear discriminant analysis for inferences about identity
    • S. J. D. Prince and J. H. Elder, "Probabilistic linear discriminant analysis for inferences about identity, " in IEEE ICCV, 2007, pp. 1-8.
    • (2007) IEEE ICCV , pp. 1-8
    • Prince, S.J.D.1    Elder, J.H.2
  • 21
    • 57749193836 scopus 로고    scopus 로고
    • Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory
    • T. Toda, A. Black, and K. Tokuda, "Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory, " IEEE Trans. on Audio, Speech, and Language Processing, vol. 15, no. 8, pp. 2222-2235, 2007.
    • (2007) IEEE Trans. on Audio, Speech, and Language Processing , vol.15 , Issue.8 , pp. 2222-2235
    • Toda, T.1    Black, A.2    Tokuda, K.3
  • 24
    • 0033884858 scopus 로고    scopus 로고
    • Speaker verification using adapted Gaussian mixture models
    • D. A. Reynolds, T. F. Quatieri, and R. B. Dunn, "Speaker verification using adapted Gaussian mixture models, " Digital Signal Processing, vol. 10, pp. 19-41, 2000.
    • (2000) Digital Signal Processing , vol.10 , pp. 19-41
    • Reynolds, D.A.1    Quatieri, T.F.2    Dunn, R.B.3
  • 25
    • 84865733857 scopus 로고    scopus 로고
    • Analysis of i-vector length normalization in speaker recognition systems
    • D. Garcia-Romero and C. Espy-Wilson, "Analysis of i-vector length normalization in speaker recognition systems, " in Interspeech, 2011, pp. 249-252.
    • (2011) Interspeech , pp. 249-252
    • Garcia-Romero, D.1    Espy-Wilson, C.2
  • 28
    • 0033902487 scopus 로고    scopus 로고
    • Applying logistic regression to the fusion of the NIST'99 1-speaker submissions
    • 2000
    • S. Pigeon, P. Druyts, and P. Verlinde, "Applying logistic regression to the fusion of the NIST'99 1-speaker submissions, " Digital Signal Processing, vol. 10, no. 1-3, pp. 237-248, 2000.
    • Digital Signal Processing , vol.10 , Issue.1-3 , pp. 237-248
    • Pigeon, S.1    Druyts, P.2    Verlinde, P.3
  • 29
    • 51449086024 scopus 로고    scopus 로고
    • Fusion of heterogeneous speaker recognition systems in the STBU submission for the NIST speaker recognition evaluation 2006
    • N. Brümmer et al., "Fusion of heterogeneous speaker recognition systems in the STBU submission for the NIST speaker recognition evaluation 2006, " IEEE Trans. on Speech, Audio and Language Processing, vol. 15, no. 7, pp. 2072-2084, 2007.
    • (2007) IEEE Trans. on Speech, Audio and Language Processing , vol.15 , Issue.7 , pp. 2072-2084
    • Brümmer, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.