Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 531-536.doi: 10.11896/jsjkx.210500147
• Information Security • Previous Articles Next Articles
GUO Xing-chen, YU Yi-biao
CLC Number:
[1] NAIR R,SALAM N.A reliable speaker verification systembased on LPCC and DTW[C]//2014 IEEE International Conference on Computational Intelligence and Computing Research.IEEE,2014:1-4. [2] BALASINGAM M D,KUMAR C S.Refining Cosine Distance Features for Robust Speaker Verification[C]//2018 International Conference on Communication and Signal Processing(ICCSP).IEEE,2018:0152-0155. [3] YAMAGISHI J,KINNUNEN T H,EVANS N,et al.Introduction to the Issue on Spoofing and Countermeasures for Automa-tic Speaker Verification[J].IEEE Journal of Selected Topics in Signal Processing,2017,11(4):585-587. [4] TIAN X,LEE S W,WU Z,et al.An exemplar-based approach to frequency warping for voice conversion[J].IEEE/ACM Tran-sactions on Audio,Speech,and Language Processing,2017,25(10):1863-1876. [5] LI S L,WANG Y,GAN J Y.Recorded speech detection algo-rithm[J].Signal Processing,2017,33(1):95-101. [6] KAMBLE M R,PATIL H A.Novel energy separation based instantaneous frequency features for spoof speech detection[C]//2017 25th European Signal Processing Conference(EUSIPCO).IEEE,2017:106-110. [7] PATIL H A,KAMBLE M R,PATEL T B,et al.Novel Variable Length Teager Energy Separation Based Instantaneous Frequency Features for Replay Detection[C]//INTERSPEECH.2017:12-16. [8] JELIL S,DAS R K,PRASANNA S R M,et al.Spoof Detection Using Source,Instantaneous Frequency and Cepstral Features[C]//Interspeech.2017:22-26. [9] JI Z,LI Z Y,LI P,et al.Ensemble Learning for Countermeasure of Audio Replay Spoofing Attack in ASVspoof2017[C]//INTERSPEECH.2017:87-91. [10] NAGARSHETH P,KHOURY E,PATIL K,et al.Replay Attack Detection Using DNN for Channel Discrimination[C]//Interspeech.2017:97-101. [11] ALLURI K R,ACHANTA S,KADIRI S R,et al.SFF Anti-Spoofer:IIIT-H Submission for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017[C]//Interspeech.2017:107-111. [12] WANG X,XIAO Y,ZHU X.Feature Selection Based on CQCCs for Automatic Speaker Verification Spoofing[C]//INTERSPEECH.2017:32-36. [13] PENG H,LONG F,DING C.Feature selection based on mutual information:criteria of max-dependency,max-relevance,and min-redundancy[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2005(8):1226-1238. [14] WITKOWSKI M,KACPRZAK S,ZELASKO P,et al.AudioReplay Attack Detection Using High-Frequency Features[C]//INTERSPEECH.2017:27-31. [15] KAMBLE M R,PATIL H A.Analysis of Reverberation viaTeager Energy Features for Replay Spoof Speech Detection[C]//2019 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP 2019).IEEE,2019. [16] KAMBLE M R,PATIL H A.Detection of Replay Spoof Speech Using Teager Energy Feature Cues[J].Computer Speech & Language,2020,65:101140. [17] TODISCO M,DELGADO H,EVANS N.Constant Q cepstralcoefficients:A spoofing countermeasure for automatic speaker verification[J].Computer Speech & Language,2017,45:516-535. |
[1] | ZHENG Chun-jun, WANG Chun-li, JIA Ning. Survey of Acoustic Feature Extraction in Speech Tasks [J]. Computer Science, 2020, 47(5): 110-119. |
[2] | HUA Ming, LI Dong-dong, WANG Zhe, GAO Da-qi. End-to-End Speaker Recognition Based on Frame-level Features [J]. Computer Science, 2020, 47(10): 169-173. |
[3] | LUO Yuan and SUN Long. New Method of Robust Voiceprint Feature Extraction and Fusion [J]. Computer Science, 2016, 43(8): 297-299. |
[4] | . TEo-CrCC Characteristic Parameter Extraction Method for Speaker Recognition in Noisy Environments [J]. Computer Science, 2012, 39(12): 198-203. |
|