{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:41Z","timestamp":1740099161961,"version":"3.37.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000202"},{"type":"electronic","value":"9783030000219"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00021-9_27","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T15:21:11Z","timestamp":1537888871000},"page":"289-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Replay Voice Detection Algorithm Based on Multi-feature Fusion"],"prefix":"10.1007","author":[{"given":"Lang","family":"Lin","sequence":"first","affiliation":[]},{"given":"Rangding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Diqun","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Can","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"issue":"3","key":"27_CR1","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TASL.2010.2051269","volume":"19","author":"D Zhu","year":"2010","unstructured":"Zhu, D., Ma, B., Li, H.: Speaker verification with feature-space MAPLR parameters. IEEE Trans. Audio Speech Lang. Process. 19(3), 505\u2013515 (2010)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Wu, Z., Kinnunen, T., Evans, N., et al.: ASV spoof 2015: The first automatic speaker verification spoofing and countermeasures challenge. In: 16th Annual Conference of the International Speech Communication Association, INTERSPEECH 2015, vol. 11, pp. 588\u2013604. INTERSPEECH, Dresden (2015)","DOI":"10.21437\/Interspeech.2015-462"},{"key":"27_CR3","unstructured":"Alegre, F., Janicki, A., Evans, N.: Re-assessing the threat of replay spoofing attacks against automatic speaker verification. biometrics special interest group. In: Proceedings of the 2014 Biometrics Special Interest Group, pp. 1\u20136. IEEE, Piscataway (2014)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Shang, W., Stevensin, M.: A playback attack detector for speaker verification systems. In: International Symposium on Communications Control and Signal Processing, ISCCSP 2008, pp. 1144\u20131149. IEEE, Piscataway (2008)","DOI":"10.1109\/ISCCSP.2008.4537397"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.specom.2014.12.003","volume":"67","author":"G Jakub","year":"2015","unstructured":"Jakub, G., Marcin, G., Rafal, S.: Playback attack detection for text-dependent speaker verification over telephone channels. Speech Commun. 67, 143\u2013153 (2015)","journal-title":"Speech Commun."},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Todisco, M., Delgado, H., Evans, N.: A new feature for automatic speaker verification anti-spoofing: constant Q cepstral coefficients. In: Odyssey 2016-The Speaker and Language Recognition Workshop, pp. 283\u2013290. IEEE, Piscataway (2016)","DOI":"10.21437\/Odyssey.2016-41"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1109\/JSTSP.2017.2671435","volume":"11","author":"Z Wu","year":"2017","unstructured":"Wu, Z., Yamagishi, J., Kinnunen, T., et al.: ASV spoof: the automatic speaker verification spoofing and countermeasures challenge. IEEE J. Sel. Top. Signal Process. 11, 588\u2013604 (2017)","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Ji, Z., Li, Z.Y., Li, P., et al.: Ensemble learning for countermeasure of audio replay spoofing attack in ASVspoof2017. In: INTERSPEECH 2017, pp. 87\u201391. INTERSPEECH, Stockholm (2017)","DOI":"10.21437\/Interspeech.2017-1246"},{"key":"27_CR9","unstructured":"Lantian, L., Yixiang, C., Dong, W.: A study on replay attack and anti-spoofing for automatic speaker verification. In: INTERSPEECH 2017, pp. 92\u201396. INTERSPEECH, Stockholm (2017)"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Evans, N.W.D., Kinnunen, T., Yamagishi, J.: Spoofing and countermeasures for automatic speaker verification. In: Proceedings of the 2013 Conference of the International Speech Communication Association, INTERSPEECH 2013, pp. 925\u2013929. INTERSPEECH, Lyon (2013)","DOI":"10.21437\/Interspeech.2013-288"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Lee, K.A., Larcher, A., Wang, G., et al.: The reddots data collection for speaker recognition. In: 16th Annual Conference of the International Speech Communication Association, INTERSPEECH 2015, pp. 2996\u20133000. INTERSPEECH, Dresden (2015)","DOI":"10.21437\/Interspeech.2015-95"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Kinnunen, T., Sahidullah, M., Delgado, H., et al.: The ASV spoof 2017 challenge: assessing the limits of replay spoofing attack detection. In: INTERSPEECH 2017, pp. 1\u20136. INTERSPEECH, Stockholm (2017)","DOI":"10.21437\/Interspeech.2017-1111"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00021-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T18:17:45Z","timestamp":1662142665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00021-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000202","9783030000219"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00021-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}