-
1
-
-
70350125882
-
An overview of text-independent speaker recognition: From features to supervectors
-
January
-
T. Kinnunen and H. Li, "An overview of text-independent speaker recognition: from features to supervectors," Speech Communication, vol. 52 (1), pp. 12-40, January 2010.
-
(2010)
Speech Communication
, vol.52
, Issue.1
, pp. 12-40
-
-
Kinnunen, T.1
Li, H.2
-
2
-
-
37849041688
-
Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the nist 1998 speaker recognition evaluation
-
G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, "Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the nist 1998 speaker recognition evaluation," in ICSLP, 1998, vol. 13.
-
(1998)
ICSLP
, vol.13
-
-
Doddington, G.1
Liggett, W.2
Martin, A.3
Przybocki, M.4
Reynolds, D.5
-
3
-
-
73849087674
-
The biometric menagerie
-
N. Yager and T. Dunstone, "The biometric menagerie," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 2, pp. 220-230, 2010.
-
(2010)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.32
, Issue.2
, pp. 220-230
-
-
Yager, N.1
Dunstone, T.2
-
4
-
-
84906263293
-
Spoofing and countermeasures for automatic speaker verification
-
Lyon, France, August
-
N. Evans, T. Kinnunen, and J. Yamagishi, "Spoofing and countermeasures for automatic speaker verification," in Interspeech 2013, Lyon, France, August 2013, pp. 925-929.
-
(2013)
Interspeech 2013
, pp. 925-929
-
-
Evans, N.1
Kinnunen, T.2
Yamagishi, J.3
-
5
-
-
84867600098
-
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
-
Kyoto, Japan, March
-
T. Kinnunen, Z.-Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech," in ICASSP 2012, Kyoto, Japan, March 2012, pp. 4401-4404.
-
(2012)
ICASSP 2012
, pp. 4401-4404
-
-
Kinnunen, T.1
Wu, Z.-Z.2
Lee, K.A.3
Sedlak, F.4
Chng, E.S.5
Li, H.6
-
6
-
-
84865369980
-
Evaluation of speaker verification security and detection of HMM-based synthetic speech
-
Oct
-
P.L. De Leon, M. Pucher, J. Yamagishi, I. Hernaez, and I. Saratxaga, "Evaluation of speaker verification security and detection of HMM-based synthetic speech," Audio, Speech, and Language Processing, IEEE Transactions on, vol. 20, no. 8, pp. 2280-2290, Oct 2012.
-
(2012)
Audio, Speech, and Language Processing, IEEE Transactions on
, vol.20
, Issue.8
, pp. 2280-2290
-
-
De Leon, P.L.1
Pucher, M.2
Yamagishi, J.3
Hernaez, I.4
Saratxaga, I.5
-
7
-
-
79952940570
-
Detecting replay attacks from far-field recordings on speaker verification systems
-
J. Villalba and E. Lleida, "Detecting replay attacks from far-field recordings on speaker verification systems," Biometrics and ID Management, pp. 274-285, 2011.
-
(2011)
Biometrics and ID Management
, pp. 274-285
-
-
Villalba, J.1
Lleida, E.2
-
8
-
-
77956826012
-
Automatic speaker recognition as a measurement of voice imitation and conversion
-
M. Farrús, M. Wagner, D. Erro, and F. J. Hernando, "Automatic speaker recognition as a measurement of voice imitation and conversion," The Int. Journal of Speech, Language and the Law, vol. 1, no. 17, pp. 119-142, 2010.
-
(2010)
The Int. Journal of Speech, Language and the Law
, vol.1
, Issue.17
, pp. 119-142
-
-
Farrús, M.1
Wagner, M.2
Erro, D.3
Hernando, F.J.4
-
9
-
-
39149103755
-
Voice disguise and automatic detection: Review and perspectives
-
P. Perrot, G. Aversano, and G. Chollet, "Voice disguise and automatic detection: Review and perspectives," in Progress in Nonlinear Speech Processing, Lecture Notes in Computer Science, pp. 101-117. 2007.
-
(2007)
Progress in Nonlinear Speech Processing, Lecture Notes in Computer Science
, pp. 101-117
-
-
Perrot, P.1
Aversano, G.2
Chollet, G.3
-
11
-
-
84890503314
-
Evaluation of mimicked speech using prosodic features
-
Vancouver, May
-
Leena Mary, Anish Babu K. K, Aju Joseph, and Gibin M. George, "Evaluation of mimicked speech using prosodic features," in ICASSP 2013, Vancouver, May 2013, pp. 7189-7193.
-
(2013)
ICASSP 2013
, pp. 7189-7193
-
-
Mary, L.1
Anish Babu, K.K.2
Joseph, A.3
George, G.M.4
-
12
-
-
14544274085
-
Vulnerability of speaker verification to voice mimicking
-
Hong Kong, October
-
Y.W. Lau, M. Wagner, and D. Tran, "Vulnerability of speaker verification to voice mimicking," in Proc. Int. Symp on Intelligent Multimedia, Video & Speech Processing (ISIMP'2004), Hong Kong, October 2004, pp. 145-148.
-
(2004)
Proc. Int. Symp on Intelligent Multimedia, Video & Speech Processing (ISIMP'2004)
, pp. 145-148
-
-
Lau, Y.W.1
Wagner, M.2
Tran, D.3
-
13
-
-
33745309698
-
Testing voice mimicry with the YOHO speaker verification corpus
-
Melbourne, Australia, September
-
Y.W. Lau, D. Tran, and M. Wagner, "Testing voice mimicry with the YOHO speaker verification corpus," in Knowledge-Based Intelligent Information and Engineering Systems (KES 2005), Melbourne, Australia, September 2005, pp. 15-21.
-
(2005)
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)
, pp. 15-21
-
-
Lau, Y.W.1
Tran, D.2
Wagner, M.3
-
14
-
-
84928920684
-
Can a professional imitator fool a GMM-based speaker verification system?
-
J. Mariéthoz and S. Bengio, "Can a professional imitator fool a GMM-based speaker verification system?," Idiaprr, IDIAP, 2005.
-
(2005)
Idiaprr, IDIAP
-
-
Mariéthoz, J.1
Bengio, S.2
-
15
-
-
84906213805
-
I-vector meet imitators: On vulnerability of speaker verification systems against voice mimicry
-
Lyon, France, August
-
R. González Hautamäki, T. Kinnunen, V. Hautamäki, T. Leino, and A-M. Laukkanen, "I-vector meet imitators: on vulnerability of speaker verification systems against voice mimicry," in Interspeech 2013, Lyon, France, August 2013.
-
(2013)
Interspeech 2013
-
-
González Hautamäki, R.1
Kinnunen, T.2
Hautamäki, V.3
Leino, T.4
Laukkanen, A.-M.5
-
16
-
-
0033889739
-
Speaker verification by human listeners: Experiments comparing human and machine performance using the NIST 1998 speaker evaluation data
-
A. Schmidt-Nielsen and T. H. Crystal, "Speaker verification by human listeners: Experiments comparing human and machine performance using the NIST 1998 speaker evaluation data," Digital Signal Processing, vol. 10, no. 13, pp. 249-266, 2000.
-
(2000)
Digital Signal Processing
, vol.10
, Issue.13
, pp. 249-266
-
-
Schmidt-Nielsen, A.1
Crystal, T.H.2
-
17
-
-
79959816522
-
Approaching human listener accuracy with modern speaker verification
-
Makuhari, Japan, September
-
V. Hautamäki, T. Kinnunen, M. Nosratighods, Kong Aik Lee, Bin Ma, and Haizhou Li, "Approaching human listener accuracy with modern speaker verification," in Interspeech 2010, Makuhari, Japan, September 2010, pp. 1473-1476.
-
(2010)
Interspeech 2010
, pp. 1473-1476
-
-
Hautamäki, V.1
Kinnunen, T.2
Nosratighods, M.3
Aik Lee, K.4
Ma, B.5
Li, H.6
-
18
-
-
80051602409
-
Including human expertise in speaker recognition systems: Report on a pilot evaluation
-
Prague, Czech Republic, May
-
C. Greenberg, A. Martin, G. Doddington, and J. Godfrey, "Including human expertise in speaker recognition systems: report on a pilot evaluation," in ICASSP 2011, Prague, Czech Republic, May 2011, p. 5896 5899.
-
(2011)
ICASSP 2011
, pp. 5896-5899
-
-
Greenberg, C.1
Martin, A.2
Doddington, G.3
Godfrey, J.4
-
19
-
-
84906241746
-
Merging human and automatic system decisions to improve speaker recognition performance
-
Lyon, France, August
-
R. González Hautamäki, V. Hautamäki, P. Rajan, and T. Kinnunen, "Merging human and automatic system decisions to improve speaker recognition performance," in Interspeech 2013, Lyon, France, August 2013.
-
(2013)
Interspeech 2013
-
-
González Hautamäki, R.1
Hautamäki, V.2
Rajan, P.3
Kinnunen, T.4
-
20
-
-
84906236343
-
-
M.S. thesis, University of Tampere, in Finnish.
-
Johanna Leskelä, "Changes in f0, formant frequencies and spectral slope in imitation," M.S. thesis, University of Tampere, 2011, in Finnish.
-
(2011)
Changes in f0, Formant Frequencies and Spectral Slope in Imitation
-
-
Leskelä, J.1
-
21
-
-
0021892216
-
Speech enhancement using a minimum mean-square error log-spectral amplitude estimator
-
Apr
-
Y. Ephraim and D. Malah, "Speech enhancement using a minimum mean-square error log-spectral amplitude estimator," Acoustics, Speech and Signal Processing, IEEE Transactions on, vol. 33, no. 2, pp. 443-445, Apr 1985.
-
(1985)
Acoustics, Speech and Signal Processing, IEEE Transactions on
, vol.33
, Issue.2
, pp. 443-445
-
-
Ephraim, Y.1
Malah, D.2
-
23
-
-
33947667509
-
Subjective comparison of speech enhancement algorithms
-
May
-
Yi Hu and P.C. Loizou, "Subjective comparison of speech enhancement algorithms," in Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on, May 2006, vol. 1, pp. I-I.
-
(2006)
Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on
, vol.1
, pp. I
-
-
Hu, Y.1
Loizou, P.C.2
-
24
-
-
0033884858
-
Speaker verification using adapted Gaussian mixture models
-
Jan
-
D.A. Reynolds, T.F. Quatieri, and R.B. Dunn, "Speaker verification using adapted Gaussian mixture models," Digital Signal Processing, vol. 10, no. 1, pp. 19-41, Jan 2000.
-
(2000)
Digital Signal Processing
, vol.10
, Issue.1
, pp. 19-41
-
-
Reynolds, D.A.1
Quatieri, T.F.2
Dunn, R.B.3
-
25
-
-
79951609039
-
Front-end factor analysis for speaker verification
-
May
-
N. Dehak, P.J. Kenny, R. Dehak, P. Dumouchel, and P. Ouellet, "Front-end factor analysis for speaker verification," ITASLP, vol. 19, no. 4, pp. 788-798, May 2011.
-
(2011)
ITASLP
, vol.19
, Issue.4
, pp. 788-798
-
-
Dehak, N.1
Kenny, P.J.2
Dehak, R.3
Dumouchel, P.4
Ouellet, P.5
-
26
-
-
84865733857
-
Analysis of i-vector length normalization in speaker recognition systems
-
Florence, Italy, August
-
D. Garcia-Romero and C. Y. Espy-Wilson, "Analysis of i-vector length normalization in speaker recognition systems," in Interspeech 2011, Florence, Italy, August 2011, pp. 249-252.
-
(2011)
Interspeech 2011
, pp. 249-252
-
-
Garcia-Romero, D.1
Espy-Wilson, C.Y.2
-
27
-
-
85028060103
-
Cosine similarity scoring without score normalization techniques
-
N. Dehak, R. Dehak, J. Glass, D. Reynolds, and P. Kenny, "Cosine similarity scoring without score normalization techniques," in Proc. Odyssey Speaker and Language Recognition Workshop, 2010, pp. 71-75.
-
(2010)
Proc. Odyssey Speaker and Language Recognition Workshop
, pp. 71-75
-
-
Dehak, N.1
Dehak, R.2
Glass, J.3
Reynolds, D.4
Kenny, P.5
-
28
-
-
85073147004
-
Voicebox: Speech processing toolbox for matlab
-
Mike Brookes et al., "Voicebox: Speech processing toolbox for matlab," Software, available [January 2014] from www. ee. ic. ac. uk/hp/staff/dmb/voicebox/voicebox. html, 2006.
-
(2006)
Software
-
-
Brookes, M.1
-
29
-
-
0001072895
-
The use of confidence or fiducial limits illustrated in the case of the binomial
-
C. Clopper and E. S. Pearson, "The use of confidence or fiducial limits illustrated in the case of the binomial," Biometrika, vol. 26, pp. 404-413, 1934.
-
(1934)
Biometrika
, vol.26
, pp. 404-413
-
-
Clopper, C.1
Pearson, E.S.2
|