Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification
Tài liệu tham khảo
Brown, 1991, Calculation of a constant Q spectral transform, J. Acoust. Soc. Am., 89, 425, 10.1121/1.400476
Brown, 1999, Computer identification of musical instruments using pattern recognition with cepstral coefficients as features, J. Acoust. Soc. Am., 105, 1933, 10.1121/1.426728
Campisi, 2013
Chen, 2015, Robust deep feature for spoofing detection – the SJTU system for ASVspoof 2015 challenge
Chingovska, 2014, Biometrics evaluation under spoofing attacks, IEEE Trans. Inf. Forensics Secur., 9, 2264, 10.1109/TIFS.2014.2349158
Costantini, 2009, Event based transcription system for polyphonic piano music, Signal Process., 89, 1798, 10.1016/j.sigpro.2009.03.024
Davis, 1980, Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences, IEEE Trans. Acoust. Speech Signal Process., 28, 357, 10.1109/TASSP.1980.1163420
De Leon, 2012, Evaluation of speaker verification security and detection of HMM-based synthetic speech, IEEE Trans. Audio Speech Lang. Process., 20, 2280, 10.1109/TASL.2012.2201472
Glasberg, 1990, Derivation of auditory filter shapes from notched-noise data, Hear. Res., 47, 103, 10.1016/0378-5955(90)90170-T
Hanilçi, 2015, Classifiers for synthetic speech detection: a comparison, 2087
Jacob, 2014, Design and implementation of polyphase decimation filter, In: International Journal of Computer Networks and Wireless Communications (IJCNWC),, 4, 123
Korshunov, 2016, Overview of BTAS 2016 speaker anti-spoofing competition
Mallat, 2008
Maymon, 2011, Sinc interpolation of nonuniform samples, IEEE Trans. Signal Process., 59, 4745, 10.1109/TSP.2011.2160054
Mont-Reynaud, B., 1986. The Bounded-Q approach to time-varying spectral analysis. Technical Report, Stanford University, CCRMA.
Moore, 2003
Novoselov, 2015, STC anti-spoofing systems for the asvspoof 2015 challenge
Oppenheim, 1999
Prabhakar, 2003, Biometric recognition: security and privacy concerns, In IEEE Security & Privacy, 1, 33, 10.1109/MSECP.2003.1193209
Radocy, 1979
Ratha, 2001, Enhancing security and privacy in biometrics-based authentication systems, IBM Syst. J., 40, 614, 10.1147/sj.403.0614
Vetterli, 1992, Wavelets and filter banks: theory and design, IEEE Trans. Signal Process., 40, 2207, 10.1109/78.157221
Wolberg, 1988
Wu, 2015, Spoofing and countermeasures for speaker verification: a survey, Speech Commun., 66, 130, 10.1016/j.specom.2014.10.005
Wu, 2014, ASVspoof 2015: the first automatic verification spoofing and countermeasures challenge evaluation plan