-
1
-
-
33744779400
-
Biometrics: A tool for information security
-
June
-
A. Jain, A. Ross, and S. Pankati, "Biometrics: A tool for information security, " IEEE Trans. on Information Forensics and Security (TIFS), vol. 1, no. 2, pp. 125-143, June 2006.
-
(2006)
IEEE Trans. on Information Forensics and Security (TIFS)
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.1
Ross, A.2
Pankati, S.3
-
2
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems, " IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
3
-
-
84906263293
-
Spoofing and countermeasures for automatic speaker verification
-
N. Evans, T. Kinnunen, and J. Yamagishi, "Spoofing and countermeasures for automatic speaker verification, " in Proc. Interspeech, 2013.
-
(2013)
Proc. Interspeech
-
-
Evans, N.1
Kinnunen, T.2
Yamagishi, J.3
-
6
-
-
33646787422
-
Voice forgery using alisp: Indexation in a client memory
-
P. Perrot, G. Aversano, R. Blouet, M. Charbit, and G. Chollet, "Voice forgery using ALISP: indexation in a client memory, " in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2005.
-
(2005)
Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Perrot, P.1
Aversano, G.2
Blouet, R.3
Charbit, M.4
Chollet, G.5
-
7
-
-
33947714703
-
Effect of speech transformation on impostor acceptance
-
D. Matrouf, J.-F. Bonastre, and C. Fredouille, "Effect of speech transformation on impostor acceptance, " in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2006.
-
(2006)
Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Matrouf, D.1
Bonastre, J.-F.2
Fredouille, C.3
-
8
-
-
65349113532
-
Artificial impostor voice transformation effects on false acceptance rates
-
J.-F. Bonastre, D. Matrouf, and C. Fredouille, "Artificial impostor voice transformation effects on false acceptance rates, " in Proc. Interspeech, 2007.
-
(2007)
Proc. Interspeech
-
-
Bonastre, J.-F.1
Matrouf, D.2
Fredouille, C.3
-
9
-
-
84867600098
-
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
-
T. Kinnunen, Z.-Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech, " in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2012.
-
(2012)
Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Kinnunen, T.1
Wu, Z.-Z.2
Lee, K.A.3
Sedlak, F.4
Chng, E.S.5
Li, H.6
-
10
-
-
84874448812
-
A study on spoofing attack in state-of-the-art speaker verification: The telephone speech case
-
Z. Wu, T. Kinnunen, E. S. Chng, H. Li, and E. Ambikairajah, "A study on spoofing attack in state-of-the-art speaker verification: The telephone speech case, " in Proc. Asia-Pacific Signal Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012.
-
(2012)
Proc. Asia-Pacific Signal Information Processing Association Annual Summit and Conference (APSIPA ASC)
-
-
Wu, Z.1
Kinnunen, T.2
Chng, E.S.3
Li, H.4
Ambikairajah, E.5
-
11
-
-
84906234851
-
Voice transformation-based spoofing of text-dependent speaker verification systems
-
Z. Kons and H. Aronowitz, "Voice transformation-based spoofing of text-dependent speaker verification systems, " in Proc. Interspeech, 2013.
-
(2013)
Proc. Interspeech
-
-
Kons, Z.1
Aronowitz, H.2
-
12
-
-
79951609039
-
Front-end factor analysis for speaker verification
-
May
-
N. Dehak, P. Kenny, R. Dehak, P. Dumouchel, and P. Ouellet, "Front-end factor analysis for speaker verification, " IEEE Trans. on Audio, Speech, and Language Processing, vol. 19, no. 4, pp. 788-798, May 2011.
-
(2011)
IEEE Trans. on Audio, Speech, and Language Processing
, vol.19
, Issue.4
, pp. 788-798
-
-
Dehak, N.1
Kenny, P.2
Dehak, R.3
Dumouchel, P.4
Ouellet, P.5
-
13
-
-
84869773314
-
On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
-
F. Alegre, R. Vipperla, N. Evans, and B. Fauve, "On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals, " in Proc. European Signal Processing Conference (EUSIPCO), 2012.
-
(2012)
Proc. European Signal Processing Conference (EUSIPCO)
-
-
Alegre, F.1
Vipperla, R.2
Evans, N.3
Fauve, B.4
-
14
-
-
84878412793
-
Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals
-
F. Alegre, R. Vipperla, N. Evans et al., "Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals, " in Proc. Interspeech, 2012.
-
(2012)
Proc. Interspeech
-
-
Alegre, F.1
Vipperla, R.2
Evans, N.3
-
15
-
-
84878410960
-
Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition
-
Z. Wu, E. S. Chng, and H. Li, "Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition, " in Proc. Interspeech, 2012.
-
(2012)
Proc. Interspeech
-
-
Wu, Z.1
Chng, E.S.2
Li, H.3
-
16
-
-
84865369980
-
Evaluation of speaker verification security and detection of hmm-based synthetic speech
-
D. L. P. L., M. Pucher, J. Yamagishi, I. Hernaez, and I. Saratxaga, "Evaluation of speaker verification security and detection of HMM-based synthetic speech, " IEEE Trans. on Audio, Speech, and Language Processing, vol. 20, no. 8, pp. 2280-2290, 2012.
-
(2012)
IEEE Trans. on Audio, Speech, and Language Processing
, vol.20
, Issue.8
, pp. 2280-2290
-
-
Pucher, D.L.P.L.M.1
Yamagishi, J.2
Hernaez, I.3
Saratxaga, I.4
-
17
-
-
84890542394
-
Spoofing countermeasures to protect automatic speaker verification from voice conversion
-
F. Alegre, A. Amehraye, and N. Evans, "Spoofing countermeasures to protect automatic speaker verification from voice conversion, " in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2013.
-
(2013)
Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Alegre, F.1
Amehraye, A.2
Evans, N.3
-
18
-
-
84890543945
-
Synthetic speech detection using temporal modulation feature
-
Z. Wu, X. Xiao, E. S. Chng, and H. Li, "Synthetic speech detection using temporal modulation feature, " in ICASSP, 2013, pp. 7234-7238.
-
(2013)
ICASSP
, pp. 7234-7238
-
-
Wu, Z.1
Xiao, X.2
Chng, E.S.3
Li, H.4
-
19
-
-
84893797780
-
A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns
-
F. Alegre, A. Amehraye, and N. Evans, "A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns, " in Proc. Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), 2013.
-
(2013)
Proc. Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS)
-
-
Alegre, F.1
Amehraye, A.2
Evans, N.3
-
20
-
-
85010800426
-
Probabilistic linear discriminant analysis for inferences about identity
-
S. J. D. Prince and J. H. Elder, "Probabilistic linear discriminant analysis for inferences about identity, " in IEEE ICCV, 2007, pp. 1-8.
-
(2007)
IEEE ICCV
, pp. 1-8
-
-
Prince, S.J.D.1
Elder, J.H.2
-
21
-
-
57749193836
-
Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory
-
T. Toda, A. Black, and K. Tokuda, "Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory, " IEEE Trans. on Audio, Speech, and Language Processing, vol. 15, no. 8, pp. 2222-2235, 2007.
-
(2007)
IEEE Trans. on Audio, Speech, and Language Processing
, vol.15
, Issue.8
, pp. 2222-2235
-
-
Toda, T.1
Black, A.2
Tokuda, K.3
-
22
-
-
84884967629
-
Anti-spoofing in action: Joint operation with a verification system
-
I. Chingovska, A. Anjos, and S. Marcel, "Anti-spoofing in action: joint operation with a verification system, " in IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, 2013.
-
(2013)
IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics
-
-
Chingovska, I.1
Anjos, A.2
Marcel, S.3
-
24
-
-
0033884858
-
Speaker verification using adapted Gaussian mixture models
-
D. A. Reynolds, T. F. Quatieri, and R. B. Dunn, "Speaker verification using adapted Gaussian mixture models, " Digital Signal Processing, vol. 10, pp. 19-41, 2000.
-
(2000)
Digital Signal Processing
, vol.10
, pp. 19-41
-
-
Reynolds, D.A.1
Quatieri, T.F.2
Dunn, R.B.3
-
25
-
-
84865733857
-
Analysis of i-vector length normalization in speaker recognition systems
-
D. Garcia-Romero and C. Espy-Wilson, "Analysis of i-vector length normalization in speaker recognition systems, " in Interspeech, 2011, pp. 249-252.
-
(2011)
Interspeech
, pp. 249-252
-
-
Garcia-Romero, D.1
Espy-Wilson, C.2
-
26
-
-
84878119221
-
A scalable formulation of probabilistic linear discriminant analysis
-
L. E. Shafey, C. McCool, R. Wallace, and S. Marcel, "A scalable formulation of probabilistic linear discriminant analysis, " IEEE Trans. in Pattern Analysis and Machine Intelligence, 2013.
-
(2013)
IEEE Trans. in Pattern Analysis and Machine Intelligence
-
-
Shafey, L.E.1
McCool, C.2
Wallace, R.3
Marcel, S.4
-
28
-
-
0033902487
-
Applying logistic regression to the fusion of the NIST'99 1-speaker submissions
-
2000
-
S. Pigeon, P. Druyts, and P. Verlinde, "Applying logistic regression to the fusion of the NIST'99 1-speaker submissions, " Digital Signal Processing, vol. 10, no. 1-3, pp. 237-248, 2000.
-
Digital Signal Processing
, vol.10
, Issue.1-3
, pp. 237-248
-
-
Pigeon, S.1
Druyts, P.2
Verlinde, P.3
-
29
-
-
51449086024
-
Fusion of heterogeneous speaker recognition systems in the STBU submission for the NIST speaker recognition evaluation 2006
-
N. Brümmer et al., "Fusion of heterogeneous speaker recognition systems in the STBU submission for the NIST speaker recognition evaluation 2006, " IEEE Trans. on Speech, Audio and Language Processing, vol. 15, no. 7, pp. 2072-2084, 2007.
-
(2007)
IEEE Trans. on Speech, Audio and Language Processing
, vol.15
, Issue.7
, pp. 2072-2084
-
-
Brümmer, N.1
-
31
-
-
84905215309
-
Spear: An open source toolbox for speaker recognition based on bob
-
E. Khoury, L. El Shafey, and S. Marcel, "Spear: An open source toolbox for speaker recognition based on Bob, " in IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2014.
-
(2014)
IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP)
-
-
Khoury, E.1
Shafey, L.E.2
Marcel, S.3
-
32
-
-
84871393354
-
Bob: A free signal processing and machine learning toolbox for researchers
-
A. Anjos, L. E. Shafey, R. Wallace, M. Günther, C. McCool, and S. Marcel, "Bob: A free signal processing and machine learning toolbox for researchers, " in ACM International Conference on Multimedia, 2012.
-
(2012)
ACM International Conference on Multimedia
-
-
Anjos, A.1
Shafey, L.E.2
Wallace, R.3
Günther, M.4
McCool, C.5
Marcel, S.6
|