-
2
-
-
84906263293
-
Spoofing and countermeasures for automatic speaker verification
-
N. Evans, T. Kinnunen, and J. Yamagishi, "Spoofing and countermeasures for automatic speaker verification," in Proc. Interspeech, 2013.
-
(2013)
Proc. Interspeech
-
-
Evans, N.1
Kinnunen, T.2
Yamagishi, J.3
-
3
-
-
84905231482
-
Voice anti spoofing
-
S. Marcel, S. Z. Li, and M. Nixon, Eds. Springer
-
N. Evans, T. Kinnunen, J. Yamagishi, Z. Wu, F. Alegre, and P. DeLeon, "Voice anti spoofing," in Handbook of biometric anti spoofing, S. Marcel, S. Z. Li, and M. Nixon, Eds. Springer, 2014.
-
(2014)
Handbook of Biometric Anti Spoofing
-
-
Evans, N.1
Kinnunen, T.2
Yamagishi, J.3
Wu, Z.4
Alegre, F.5
Deleon, P.6
-
4
-
-
14544274085
-
Vulnerability of speaker verification to voice mimicking
-
Y. W. Lau, M. Wagner, and D. Tran, "Vulnerability of speaker verification to voice mimicking," in Proc. Int. Symposium on Intelligent Multimedia, Video and Speech Processing, 2004.
-
(2004)
Proc. Int. Symposium on Intelligent Multimedia, Video and Speech Processing
-
-
Lau, Y.W.1
Wagner, M.2
Tran, D.3
-
5
-
-
84906227095
-
Testing voice mimicry with the YOHO speaker verification corpus
-
Springer
-
Y. Lau, D. Tran, and M. Wagner, "Testing voice mimicry with the YOHO speaker verification corpus," in Knowledge Based Intelligent Information and Engineering Systems. Springer, 2005, pp. 907-907.
-
(2005)
Knowledge Based Intelligent Information and Engineering Systems
, pp. 907-907
-
-
Lau, Y.1
Tran, D.2
Wagner, M.3
-
7
-
-
84906213805
-
I vectors meet imitators: On vulnerability of speaker verification systems against voice mimicry
-
R. G. Hautamäki, T. Kinnunen, V. Hautamäki, T. Leino, and A. M. Laukkanen, "I vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry," in Proc. Interspeech, 2013.
-
(2013)
Proc. Interspeech
-
-
Hautamäki, R.G.1
Kinnunen, T.2
Hautamäki, V.3
Leino, T.4
Laukkanen, A.M.5
-
8
-
-
85009119461
-
A robust speaker verification system against imposture using an HMM based speech synthesis system
-
T. Satoh, T. Masuko, T. Kobayashi, and K. Tokuda, "A robust speaker verification system against imposture using an HMM based speech synthesis system," in Proc. European Conference on Speech Communication and Technology (Eurospeech), 2001.
-
(2001)
Proc. European Conference on Speech Communication and Technology (Eurospeech)
-
-
Satoh, T.1
Masuko, T.2
Kobayashi, T.3
Tokuda, K.4
-
9
-
-
84865369980
-
Evaluation of speaker verification security and detection of HMMbased synthetic speech
-
P. L. De Leon, M. Pucher, J. Yamagishi, I. Hernaez, and I. Saratxaga, "Evaluation of speaker verification security and detection of HMMbased synthetic speech," IEEE Trans. Audio, Speech and Language Processing, vol. 20, no. 8, pp. 2280-2290, 2012.
-
(2012)
IEEE Trans. Audio, Speech and Language Processing
, vol.20
, Issue.8
, pp. 2280-2290
-
-
De Leon, P.L.1
Pucher, M.2
Yamagishi, J.3
Hernaez, I.4
Saratxaga, I.5
-
10
-
-
65349113532
-
Artificial impostor voice transformation effects on false acceptance rates
-
J. F. Bonastre, D. Matrouf, and C. Fredouille, "Artificial impostor voice transformation effects on false acceptance rates," in Proc. Interspeech, 2007.
-
(2007)
Proc. Interspeech
-
-
Bonastre, J.F.1
Matrouf, D.2
Fredouille, C.3
-
11
-
-
84867600098
-
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
-
T. Kinnunen, Z. Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng, and H. Li, "Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2012.
-
(2012)
Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Kinnunen, T.1
Wu, Z.Z.2
Lee, K.A.3
Sedlak, F.4
Chng, E.S.5
Li, H.6
-
12
-
-
84874448812
-
A study on spoofing attack in state of the art speaker verification: The telephone speech case
-
Z. Wu, T. Kinnunen, E. S. Chng, H. Li, and E. Ambikairajah, "A study on spoofing attack in state of the art speaker verification: the telephone speech case," in Proc. Asia Pacific Signal Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012.
-
(2012)
Proc. Asia Pacific Signal Information Processing Association Annual Summit and Conference (APSIPA ASC)
-
-
Wu, Z.1
Kinnunen, T.2
Chng, E.S.3
Li, H.4
Ambikairajah, E.5
-
13
-
-
84890542394
-
Spoofing countermeasures to protect automatic speaker verification from voice conversion
-
F. Alegre, A. Amehraye, and N. Evans, "Spoofing countermeasures to protect automatic speaker verification from voice conversion," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2013.
-
(2013)
Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Alegre, F.1
Amehraye, A.2
Evans, N.3
-
14
-
-
84906275384
-
Vulnerability evaluation of speaker verification under voice conversion spoofing: The effect of text constraints
-
Z. Wu, A. Larcher, K. A. Lee, E. S. Chng, T. Kinnunen, and H. Li, "Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints," in Proc. Interspeech, 2013.
-
(2013)
Proc. Interspeech
-
-
Wu, Z.1
Larcher, A.2
Lee, K.A.3
Chng, E.S.4
Kinnunen, T.5
Li, H.6
-
15
-
-
84906234851
-
Voice transformation based spoofing of text dependent speaker verification systems
-
Z. Kons and H. Aronowitz, "Voice transformation based spoofing of text dependent speaker verification systems," in Proc. Interspeech, 2013.
-
(2013)
Proc. Interspeech
-
-
Kons, Z.1
Aronowitz, H.2
-
18
-
-
84867605072
-
Speaker verification performance degradation against spoofing and tampering attacks
-
J. Villalba and E. Lleida, "Speaker verification performance degradation against spoofing and tampering attacks," in FALA 10 workshop, 2010, pp. 131-134.
-
(2010)
FALA 10 Workshop
, pp. 131-134
-
-
Villalba, J.1
Lleida, E.2
-
19
-
-
79952940570
-
Detecting replay attacks from far field recordings on speaker verification systems
-
C. Vielhauer, J. Dittmann, A. Drygajlo, N. Juul, and M. Fairhurst, Eds. Springer
-
"Detecting replay attacks from far field recordings on speaker verification systems," in Biometrics and ID Management, ser. Lecture Notes in Computer Science, C. Vielhauer, J. Dittmann, A. Drygajlo, N. Juul, and M. Fairhurst, Eds. Springer, 2011, pp. 274-285.
-
(2011)
Biometrics and ID Management, Ser. Lecture Notes in Computer Science
, pp. 274-285
-
-
Villalba, J.1
Lleida, E.2
-
24
-
-
0028419019
-
Maximum a posteriori estimation for multivariate gaussian mixture observations of markov chains
-
J. L. Gauvain and C. H. Lee, "Maximum a posteriori estimation for multivariate gaussian mixture observations of markov chains," IEEE Trans. on Speech and Audio Processing, vol. 2, no. 2, pp. 291-298, 1994.
-
(1994)
IEEE Trans. on Speech and Audio Processing
, vol.2
, Issue.2
, pp. 291-298
-
-
Gauvain, J.L.1
Lee, C.H.2
-
25
-
-
0033884858
-
Speaker verification using adapted gaussian mixture models
-
January
-
D. Reynolds, T. Quatieri, and R. Dunn, "Speaker verification using adapted gaussian mixture models," Digital Signal Processing, vol. 10, no. 1, pp. 19-41, January 2000.
-
(2000)
Digital Signal Processing
, vol.10
, Issue.1
, pp. 19-41
-
-
Reynolds, D.1
Quatieri, T.2
Dunn, R.3
-
26
-
-
70350125882
-
An overview of text independent speaker recognition: From features to supervectors
-
T. Kinnunen and H. Li, "An overview of text independent speaker recognition: from features to supervectors," Speech Communication, vol. 52, no. 1, pp. 12-40, 2010.
-
(2010)
Speech Communication
, vol.52
, Issue.1
, pp. 12-40
-
-
Kinnunen, T.1
Li, H.2
-
28
-
-
84878465724
-
RSR2015: Database for textdependent speaker verification using multiple pass phrases
-
A. Larcher, K. A. Lee, B. Ma, and H. Li, "RSR2015: Database for textdependent speaker verification using multiple pass phrases." in Proc. Interspeech, 2012.
-
(2012)
Proc. Interspeech
-
-
Larcher, A.1
Lee, K.A.2
Ma, B.3
Li, H.4
|