Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification

Computer Speech & Language - Tập 45 - Trang 516-535 - 2017
Massimiliano Todisco1, Héctor Delgado1, Nicholas Evans1
1EURECOM, Sophia Antipolis, France

Tài liệu tham khảo

Brown, 1991, Calculation of a constant Q spectral transform, J. Acoust. Soc. Am., 89, 425, 10.1121/1.400476

Brown, 1999, Computer identification of musical instruments using pattern recognition with cepstral coefficients as features, J. Acoust. Soc. Am., 105, 1933, 10.1121/1.426728

Campisi, 2013

Chingovska, 2014, Biometrics evaluation under spoofing attacks, IEEE Trans. Inf. Forensics Secur., 9, 2264, 10.1109/TIFS.2014.2349158

Costantini, 2009, Event based transcription system for polyphonic piano music, Signal Process., 89, 1798, 10.1016/j.sigpro.2009.03.024

Davis, 1980, Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences, IEEE Trans. Acoust. Speech Signal Process., 28, 357, 10.1109/TASSP.1980.1163420

De Leon, 2012, Evaluation of speaker verification security and detection of HMM-based synthetic speech, IEEE Trans. Audio Speech Lang. Process., 20, 2280, 10.1109/TASL.2012.2201472

Glasberg, 1990, Derivation of auditory filter shapes from notched-noise data, Hear. Res., 47, 103, 10.1016/0378-5955(90)90170-T

Hanilçi, 2015, Classifiers for synthetic speech detection: a comparison, 2087

Jacob, 2014, Design and implementation of polyphase decimation filter, In: International Journal of Computer Networks and Wireless Communications (IJCNWC),, 4, 123

Korshunov, 2016, Overview of BTAS 2016 speaker anti-spoofing competition

Mallat, 2008

Maymon, 2011, Sinc interpolation of nonuniform samples, IEEE Trans. Signal Process., 59, 4745, 10.1109/TSP.2011.2160054

Mont-Reynaud, B., 1986. The Bounded-Q approach to time-varying spectral analysis. Technical Report, Stanford University, CCRMA.

Moore, 2003

Novoselov, 2015, STC anti-spoofing systems for the asvspoof 2015 challenge

Oppenheim, 1999

Prabhakar, 2003, Biometric recognition: security and privacy concerns, In IEEE Security & Privacy, 1, 33, 10.1109/MSECP.2003.1193209

Radocy, 1979

Ratha, 2001, Enhancing security and privacy in biometrics-based authentication systems, IBM Syst. J., 40, 614, 10.1147/sj.403.0614

Vetterli, 1992, Wavelets and filter banks: theory and design, IEEE Trans. Signal Process., 40, 2207, 10.1109/78.157221

Wolberg, 1988

Wu, 2015, Spoofing and countermeasures for speaker verification: a survey, Speech Commun., 66, 130, 10.1016/j.specom.2014.10.005

Wu, 2014, ASVspoof 2015: the first automatic verification spoofing and countermeasures challenge evaluation plan