Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240400021-4.doi: 10.11896/jsjkx.240400021
• Image Processing & Multimedia Technology • Previous Articles Next Articles
ZHANG Xiao, GUAN Linyu
CLC Number:
[1]ZHANG G Q,JIN Y Z,LIU H W,et al.Study on changing rulesof electronic camouflage audio[J].Evidence Science,2010,18(4):503-509. [2]ENDRES W,BAMBACH W,FLOSSER G.Voice spectrograms as a function of age,voice disguise and voice imitation[J].J. Acoust. Soc. Am.,1971,(49):1842-1848. [3]HANSEN J H,HASAN T.Speaker recognition by machinesand humans:a tutorial review [J].IEEE Signal Process Magazine,2015,32(6):74-99. [4]ZHANG C.Acoustic Analysis of Disguised Voices with Raised and Lowered Pitch [C]//IEEE.ISCSLP,2012:353-357. [5]RODMAN R.Computer Recognition of Speakers who Disguise Their Voice [C] //Proceedings of the International Conference on Signal Processing Applications & Technology.USA:Texas,2000. [6]ZHAO L.Speech signal processing [M]//Beijing:Machinery Industry Press,2009:11. [7]Gender Recognition of Electronic Disguised Voices:Chinese[P].Patent ZL 2019 1 0959040.[2020-10-23]. |
[1] | KANG Xinchen, DONG Xueyan, YAO Dengfeng, ZHONG Jinghua. Advancements and Prospects in Dysarthria Speaker Adaptation [J]. Computer Science, 2024, 51(8): 11-19. |
[2] | LIU Xiaohu, CHEN Defu, LI Jun, ZHOU Xuwen, HU Shan, ZHOU Hao. Speaker Verification Network Based on Multi-scale Convolutional Encoder [J]. Computer Science, 2024, 51(6A): 230700083-6. |
[3] | GUO Xing-chen, YU Yi-biao. Robust Speaker Verification with Spoofing Attack Detection [J]. Computer Science, 2022, 49(6A): 531-536. |
[4] | TIAN Wei-wei, ZHOU Yue, YIN Wang, HE Ling, DENG Li-hua and LI Yuan-yuan. Automatic Voice Detection Algorithm for Schizophrenic Combining EHHT and CI [J]. Computer Science, 2020, 47(6A): 187-195. |
[5] | ZHENG Chun-jun, WANG Chun-li, JIA Ning. Survey of Acoustic Feature Extraction in Speech Tasks [J]. Computer Science, 2020, 47(5): 110-119. |
[6] | HUA Ming, LI Dong-dong, WANG Zhe, GAO Da-qi. End-to-End Speaker Recognition Based on Frame-level Features [J]. Computer Science, 2020, 47(10): 169-173. |
[7] | WANG Yong-quan, SHI Zheng-yu, ZHANG Xiao. Study on Restoration of Electronic Disguised Voice Based on DC-CNN [J]. Computer Science, 2019, 46(8): 183-188. |
[8] | ZHENG Cheng, HONG Tong-tong, XUE Man-yi. BLSTM_MLPCNN Model for Short Text Classification [J]. Computer Science, 2019, 46(6): 206-211. |
[9] | LUO Yuan and SUN Long. New Method of Robust Voiceprint Feature Extraction and Fusion [J]. Computer Science, 2016, 43(8): 297-299. |
[10] | . TEo-CrCC Characteristic Parameter Extraction Method for Speaker Recognition in Noisy Environments [J]. Computer Science, 2012, 39(12): 198-203. |
[11] | ZHENG Jian-wei,WANG Wan-liang. Novel Local Within-class Features Preservation Kernel Fisher Discriminant Algorithm and Applied in Speaker Identification [J]. Computer Science, 2010, 37(7): 243-247. |
|