-
2
-
-
0034809453
-
Enhancing secu-rity and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing secu-rity and privacy in biometrics-based authentication systems, " IBM systems Journal, vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
3
-
-
84906263293
-
Spoofing and coun-termeasures for automatic speaker verification
-
N. Evans, T. Kinnunen, and J. Yamagishi, "Spoofing and coun-termeasures for automatic speaker verification, " in Proc. Inter-speech, 2013, pp. 925-929.
-
(2013)
Proc. Inter-speech
, pp. 925-929
-
-
Evans, N.1
Kinnunen, T.2
Yamagishi, J.3
-
4
-
-
84984806995
-
Speaker recognition anti-spoofing
-
Springer
-
N. Evans, T. Kinnunen, J. Yamagishi, Z. Wu, F. Alegre, and P. De Leon, "Speaker recognition anti-spoofing, " in Handbook of Biometric Anti-Spoofing. Springer, 2014, pp. 125-146.
-
(2014)
Handbook of Biometric Anti-Spoofing
, pp. 125-146
-
-
Evans, N.1
Kinnunen, T.2
Yamagishi, J.3
Wu, Z.4
Alegre, F.5
De Leon, P.6
-
6
-
-
84919922238
-
Spoofing and countermeasures for speaker verification: A sur-vey
-
Z. Wu, N. Evans, T. Kinnunen, J. Yamagishi, F. Alegre, and H. Li, "Spoofing and countermeasures for speaker verification: A sur-vey, " Speech Communication, vol. 66, pp. 130-153, 2015.
-
(2015)
Speech Communication
, vol.66
, pp. 130-153
-
-
Wu, Z.1
Evans, N.2
Kinnunen, T.3
Yamagishi, J.4
Alegre, F.5
Li, H.6
-
7
-
-
79952940570
-
Detecting replay attacks from far-field recordings on speaker verification systems
-
Springer
-
J. Villalba and E. Lleida, "Detecting replay attacks from far-field recordings on speaker verification systems, " in Biometrics and ID Management. Springer, 2011, pp. 274-285.
-
(2011)
Biometrics and ID Management
, pp. 274-285
-
-
Villalba, J.1
Lleida, E.2
-
9
-
-
80155206937
-
Channel pattern noise based playback attack detection algorithm for speaker recognition
-
IEEE
-
Z.-F. Wang, G. Wei, and Q.-H. He, "Channel pattern noise based playback attack detection algorithm for speaker recognition, " in Machine Learning and Cybernetics (ICMLC), 2011 International Conference on, vol. 4. IEEE, 2011, pp. 1708-1713.
-
(2011)
Machine Learning and Cybernetics (ICMLC), 2011 International Conference on
, vol.4
, pp. 1708-1713
-
-
Wang, Z.-F.1
Wei, G.2
He, Q.-H.3
-
10
-
-
84906244272
-
A new speaker verification spoofing countermeasure based on local bi-nary patterns
-
F. Alegre, R. Vipperla, A. Amehraye, and N. Evans, "A new speaker verification spoofing countermeasure based on local bi-nary patterns, " in Proc. Interspeech, 2013, p. 5p.
-
(2013)
Proc. Interspeech
, pp. 5p
-
-
Alegre, F.1
Vipperla, R.2
Amehraye, A.3
Evans, N.4
-
11
-
-
84906234851
-
Voice transformation-based spoof-ing of text-dependent speaker verification systems
-
Z. Kons and H. Aronowitz, "Voice transformation-based spoof-ing of text-dependent speaker verification systems. " in Proc. In-terspeech, 2013, pp. 945-949.
-
(2013)
Proc. In-terspeech
, pp. 945-949
-
-
Kons, Z.1
Aronowitz, H.2
-
12
-
-
84906275384
-
Vulnerability evaluation of speaker verification under voice con-version spoofing: The effect of text constraints
-
Z. Wu, A. Larcher, K.-A. Lee, E. Chng, T. Kinnunen, and H. Li, "Vulnerability evaluation of speaker verification under voice con-version spoofing: The effect of text constraints. " in Proc. Inter-speech, 2013, pp. 950-954.
-
(2013)
Proc. Inter-speech
, pp. 950-954
-
-
Wu, Z.1
Larcher, A.2
Lee, K.-A.3
Chng, E.4
Kinnunen, T.5
Li, H.6
-
13
-
-
84910058696
-
Intro-ducing i-vectors for joint anti-spoofing and speaker verification
-
E. Khoury, T. Kinnunen, A. Sizov, Z. Wu, and S. Marcel, "Intro-ducing i-vectors for joint anti-spoofing and speaker verification, " in Fifteenth Annual Conference of the International Speech Com-munication Association, 2014.
-
(2014)
Fifteenth Annual Conference of the International Speech Com-munication Association
-
-
Khoury, E.1
Kinnunen, T.2
Sizov, A.3
Wu, Z.4
Marcel, S.5
-
14
-
-
79951609039
-
Front-end factor analysis for speaker verification
-
N. Dehak, P. Kenny, R. Dehak, P. Dumouchel, and P. Ouel-let, "Front-end factor analysis for speaker verification, " Audio, Speech, and Language Processing, IEEE Transactions on, vol. 19, no. 4, pp. 788-798, 2011.
-
(2011)
Audio, Speech, and Language Processing, IEEE Transactions on
, vol.19
, Issue.4
, pp. 788-798
-
-
Dehak, N.1
Kenny, P.2
Dehak, R.3
Dumouchel, P.4
Ouel-Let, P.5
-
15
-
-
85016140477
-
An adaptive algorithm for mel-cepstral analysis of speech
-
"An adaptive algorithm for mel-cepstral analysis of speech, " Proc. ICASSP, vol. 1, pp. 137-140, 1992.
-
(1992)
Proc. ICASSP
, vol.1
, pp. 137-140
-
-
-
16
-
-
79851480449
-
Speaker Verification against Synthetic Speech
-
L.-W. Chen, W. Guo, and L.-R. Dai, "Speaker Verification against Synthetic Speech, " Proceedings of the 7th International Sympo-sium on Chinese Spoken Language Processing, ISCSLP 2010, pp. 309-312, 2010.
-
(2010)
Proceedings of the 7th International Sympo-sium on Chinese Spoken Language Processing, ISCSLP 2010
, pp. 309-312
-
-
Chen, L.-W.1
Guo, W.2
Dai, L.-R.3
-
17
-
-
84865369980
-
Evaluation of speaker verification security and detection of HMM-based synthetic speech
-
P. L. De Leon, M. Pucher, J. Yamagishi, I. Hernaez, and I. Saratx-aga, "Evaluation of speaker verification security and detection of HMM-based synthetic speech, " IEEE Transactions on Audio, Speech and Language Processing, vol. 20, no. 8, pp. 2280-2290, 2012.
-
(2012)
IEEE Transactions on Audio, Speech and Language Processing
, vol.20
, Issue.8
, pp. 2280-2290
-
-
De Leon, P.L.1
Pucher, M.2
Yamagishi, J.3
Hernaez, I.4
Saratx-Aga, I.5
-
18
-
-
84878402831
-
Synthetic speech discrimination using pitch pattern statistics derived from image analysis
-
P. L. De Leon, B. Stewart, and J. Yamagishi, "Synthetic Speech Discrimination using Pitch Pattern Statistics Derived from Image Analysis. " Proc. Interspeech, no. 1, 2012.
-
(2012)
Proc. Interspeech
, Issue.1
-
-
De Leon, P.L.1
Stewart, B.2
Yamagishi, J.3
-
19
-
-
84878410960
-
Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition
-
Z.-z. Wu, E. S. Chng, and H. Li, "Detecting Converted Speech and Natural Speech for anti-Spoofing Attack in Speaker Recognition, " Proc. Interspeech, pp. 1700-1703, 2012.
-
(2012)
Proc. Interspeech
, pp. 1700-1703
-
-
Wu, Z.-Z.1
Chng, E.S.2
Li, H.3
-
20
-
-
84890543945
-
Synthetic speech detec-tion using temporal modulation feature
-
Z. Wu, X. Xiao, E. S. Chng, and H. Li, "Synthetic speech detec-tion using temporal modulation feature, " Proc. ICASSP, pp. 7234-7238, 2013.
-
(2013)
Proc. ICASSP
, pp. 7234-7238
-
-
Wu, Z.1
Xiao, X.2
Chng, E.S.3
Li, H.4
-
23
-
-
85032751458
-
Deep neural networks for acoustic modeling in speech recogni-tion: The shared views of four research groups
-
G. Hinton, L. Deng, D. Yu, G. E. Dahl, A.-r. Mohamed, N. Jaitly, A. Senior, V. Vanhoucke, P. Nguyen, T. N. Sainath, and K. Brian, "Deep neural networks for acoustic modeling in speech recogni-tion: The shared views of four research groups, " Signal Process-ing Magazine, IEEE, vol. 29, no. 6, pp. 82-97, 2012.
-
(2012)
Signal Process-ing Magazine, IEEE
, vol.29
, Issue.6
, pp. 82-97
-
-
Hinton, G.1
Deng, L.2
Yu, D.3
Dahl, G.E.4
Mohamed, A.-R.5
Jaitly, N.6
Senior, A.7
Vanhoucke, V.8
Nguyen, P.9
Sainath, T.N.10
Brian, K.11
-
24
-
-
84986202515
-
Deep neural networks for small footprint text-dependent speaker verification google inc., USA atvs-biometric recognition group, univer-sidad autonoma de madrid, Spain
-
E. Variani, X. Lei, E. Mcdermott, I. L. Moreno, and J. Gonzalez-dominguez, "DEEP NEURAL NETWORKS FOR SMALL FOOTPRINT TEXT-DEPENDENT SPEAKER VERIFICATION Google Inc., USA ATVS-Biometric Recognition Group, Univer-sidad Autonoma de Madrid, Spain, " Proc. ICASSP, pp. 4080-4084, 2014.
-
(2014)
Proc. ICASSP
, pp. 4080-4084
-
-
Variani, E.1
Lei, X.2
Mcdermott, E.3
Moreno, I.L.4
Gonzalez-Dominguez, J.5
-
25
-
-
18744386134
-
Eigenvoice model-ing with sparse training data
-
May
-
P. Kenny, G. Boulianne, and P. Dumouchel, "Eigenvoice model-ing with sparse training data, " IEEE Transactions on Speech and Audio Processing, vol. 13, no. 3, pp. 345-354, May 2005.
-
(2005)
IEEE Transactions on Speech and Audio Processing
, vol.13
, Issue.3
, pp. 345-354
-
-
Kenny, P.1
Boulianne, G.2
Dumouchel, P.3
-
26
-
-
58349106697
-
A study of interspeaker variability in speaker verification
-
P. Kenny, P. Ouellet, N. Dehak, V. Gupta, and P. Dumouchel, "A study of interspeaker variability in speaker verification, " Audio, Speech, and Language Processing, IEEE Transactions on, vol. 16, no. 5, pp. 980-988, 2008.
-
(2008)
Audio, Speech, and Language Processing, IEEE Transactions on
, vol.16
, Issue.5
, pp. 980-988
-
-
Kenny, P.1
Ouellet, P.2
Dehak, N.3
Gupta, V.4
Dumouchel, P.5
-
27
-
-
80051621424
-
Full-covariance ubm and heavy-tailed plda in i-vector speaker verification
-
P. Matejka, O. Glembek, F. Castaldo, M. J. Alam, O. Plchot, P. Kenny, L. Burget, and J. Cernocky, "Full-covariance ubm and heavy-tailed plda in i-vector speaker verification, " in Proc. ICASSP. IEEE, 2011, pp. 4828-4831.
-
(2011)
Proc. ICASSP. IEEE
, pp. 4828-4831
-
-
Matejka, P.1
Glembek, O.2
Castaldo, F.3
Alam, M.J.4
Plchot, O.5
Kenny, P.6
Burget, L.7
Cernocky, J.8
-
28
-
-
84890536185
-
Plda for speaker verification with utterances of arbitrary dura-tion
-
P. Kenny, T. Stafylakis, P. Ouellet, M. J. Alam, and P. Dumouchel, "Plda for speaker verification with utterances of arbitrary dura-tion, " in Proc. ICASSP. IEEE, 2013, pp. 7649-7653.
-
(2013)
Proc. ICASSP. IEEE
, pp. 7649-7653
-
-
Kenny, P.1
Stafylakis, T.2
Ouellet, P.3
Alam, M.J.4
Dumouchel, P.5
-
29
-
-
0141702107
-
Feature and score normalization for speaker verification of cellular data
-
IEEE
-
C. Barras and J.-L. Gauvain, "Feature and score normalization for speaker verification of cellular data, " in Proc. ICASSP, vol. 2. IEEE, 2003, pp. II-49.
-
(2003)
Proc. ICASSP
, vol.2
, pp. II-49
-
-
Barras, C.1
Gauvain, J.-L.2
|