N. Evans, T. Kinnunen, J. Yamagishi, Spoofing and countermeasures for automatic speaker verification, in Proceedings of INTERSPEECH, Lyon, 2013
Google ScholarÂ
Y.W. Lau, M. Wagner, D. Tran, Vulnerability of speaker verification to voice mimicking, in Proceedings of IEEE International Symposium on Intelligent Multimedia, Video and Speech Processing, Hong Kong, 2004, pp. 145–148
Google ScholarÂ
J. Lindberg, M. Blomberg, Vulnerability in speaker verification-a study of technical impostor techniques, in Proceedings of European Conference on Speech Communication and Technology, Budapest, vol. 3, 1999, pp. 1211–1214
Google ScholarÂ
N. Evans, T. Kinnunen, J. Yamagishi, Z. Wu, F. Alegre, P. De Leon, Voice anti-spoofing, in Handbook of Biometric Anti-spoofing, ed. by S. Marcel, S.Z. Li, M. Nixon (Springer-Verlag, London 2014)
Google ScholarÂ
T. Masuko, T. Hitotsumatsu, K. Tokuda, T. Kobayashi, On the security of HMM-based speaker verification systems against imposture using synthetic speech, in Proceedings of EUROSPEECH, Budapest, 1999
Google ScholarÂ
B.L. Pellom, J.H. Hansen, An experimental study of speaker verification sensitivity to computer voice-altered imposters, in IEEE Proceedings of the International Conference on Acoustics, Speech, and Signal Processing, Phoenix, vol. 2, 1999, pp. 837–840
Google ScholarÂ
F. Alegre, A. Amehraye, N. Evans, A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns, in Proceedings of International Conference on Biometrics: Theory, Applications and Systems, Washington, DC, 2013
Google ScholarÂ
D.B. Paul, J.M. Baker, The design for the Wall Street Journal-based CSR corpus, in Proceedings of the Workshop on Speech and Natural Language, Harriman, New York (Association for Computational Linguistics, 1992), pp. 357–362
Google ScholarÂ
P.L. De Leon, M. Pucher, J. Yamagishi, I. Hernaez, I. Saratxaga, Evaluation of speaker verification security and detection of HMM-based synthetic speech. IEEE Trans. Audio Speech Lang. Process. 20, 22802290 (2012)
Google ScholarÂ
A. Martin, Speaker databases and evaluation, in Encylopedia of Biometrics, ed. by S.Z. Li, A.K. Jain (Springer Science + Business Media, LLc 2009)
Google ScholarÂ
D. Matrouf, J.-F. Bonastre, C. Fredouille, Effect of speech transformation on impostor acceptance, in Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Toulouse, vol. 1, 2006
Google ScholarÂ
F. Alegre, A. Amehraye, N. Evans, Spoofing countermeasures to protect automatic speaker verification from voice conversion, in Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Vancouver, 2013
Google ScholarÂ
Z. Wu, A. Larcher, K.A. Lee, E.S. Chng, T. Kinnunen, H. Li, Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints, in Proceedings of INTERSPEECH, Lyon, 2013
Google ScholarÂ
A. Larcher, K.A. Lee, B. Ma, H. Li, The RSR2015: database for text-dependent speaker verification using multiple pass-phrases, in Proceedings of INTERSPEECH, Portland, 2012
Google ScholarÂ
T. Kinnunen, Z.-Z. Wu, K.A. Lee, F. Sedlak, E.S. Chng, H. Li, Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech, in Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Prague, 2012, pp. 4401–4404
Google ScholarÂ