{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:22:51Z","timestamp":1726053771781},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030314552"},{"type":"electronic","value":"9783030314569"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31456-9_55","type":"book-chapter","created":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T23:05:35Z","timestamp":1570230335000},"page":"502-510","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The GMM and I-Vector Systems Based on Spoofing Algorithms for Speaker Spoofing Detection"],"prefix":"10.1007","author":[{"given":"Hui","family":"Tang","sequence":"first","affiliation":[]},{"given":"Zhenchun","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Zhongying","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hailin","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yingen","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,5]]},"reference":[{"key":"55_CR1","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"W ZhiZheng","year":"2015","unstructured":"ZhiZheng, W., Evans, N., Kinnunen, T., Yamagishi, J., Alegre, F., Li, H.: Spoofing and countermeasures for speaker verification: a survey. Speech Commun. 66, 130\u2013153 (2015)","journal-title":"Speech Commun."},{"key":"55_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.specom.2015.05.002","volume":"72","author":"RS Hautam\u00e4ki","year":"2015","unstructured":"Hautam\u00e4ki, R.S., et al.: Automatic versus human speaker verification: the case of voice mimicry. Speech Commun. 72, 13\u201331 (2015)","journal-title":"Speech Commun."},{"issue":"8","key":"55_CR3","first-page":"768","volume":"20","author":"W Zhizheng","year":"2016","unstructured":"Zhizheng, W., Leon, P.L., Demiroglu, D., Khodabakhsh, A., et al.: Anti-spoofing for text-independent speaker verification: an initial database comparison of countermeasures and human performance. IEEE\/ACM Trans. Audio Speech Lang. Process. 20(8), 768\u2013783 (2016)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"4","key":"55_CR4","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1109\/JSTSP.2017.2671435","volume":"11","author":"W Zhizheng","year":"2017","unstructured":"Zhizheng, W., Yamagishi, J., Kinnunen, T., Sahidullah, Md, et al.: ASVspoof: the automatic speaker verification spoofing and countermeasures challenge. IEEE J. Sel. Top. Sign. Process. 11(4), 588\u2013604 (2017)","journal-title":"IEEE J. Sel. Top. Sign. Process."},{"issue":"4","key":"55_CR5","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/JSTSP.2017.2698143","volume":"11","author":"J Yamagishi","year":"2017","unstructured":"Yamagishi, J., Kinnunen, T., Evans, N., De Leon, P.L.: Introduction to the issues on spoofing and countermeasures for automatic speaker verification. IEEE J. Sel. Top. Sign. Process. 11(4), 585\u2013587 (2017)","journal-title":"IEEE J. Sel. Top. Sign. Process."},{"issue":"10","key":"55_CR6","doi-asserted-by":"publisher","first-page":"1863","DOI":"10.1109\/TASLP.2017.2723721","volume":"25","author":"T Xiaohai","year":"2017","unstructured":"Xiaohai, T., SiuWa, L., Zhizheng, W., Eng Siong, C., Haizhou, L.: An example-based approach to frequency warping for voice conversation. IEEE\/ACM Trans. Audio Speech Lang. Process. 25(10), 1863\u20131876 (2017)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"55_CR7","unstructured":"Rohan Kuman, D., Haizhou, L.: Instantaneous phase and excitation source features for detection of replay attacks. In: Asia-Pacific Signal and Information Processing Association (APSIPA) Annual Summit and Conference (ASC) 2018, November 2018"},{"key":"55_CR8","unstructured":"ASVspoof 2019: Automatic speaker verification spoofing and countermeasures challenge evaluation plan. http:\/\/www.asvspoof.org\/asvspoof2019\/asvspoof2019evaluation\/plan.pdf"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Kinnunen, T., Wu, Z.-Z., Lee, K.A., Sedlak, F., Chng, E.S., Li, H.: Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech. In: ICASSP (2012)","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"55_CR10","doi-asserted-by":"crossref","unstructured":"Lorenzo Trueba, J., et al.: The voice conversion challenge 2018: promoting development of parallel and nonparallel methods. In: The Speaker and Language Recognition Workshop, Odyssey, pp. 195\u2013202 (2018)","DOI":"10.21437\/Odyssey.2018-28"},{"key":"55_CR11","unstructured":"Leon, P.L.D., Apsingekar, V.R., Pucher, M., Yamagishi, J.: Revisiting the security of speaker verification systems against imposture using synthetic speech. In: Proceedings ICASSP, pp. 1798\u20131801 (2010)"},{"issue":"4","key":"55_CR12","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1145\/3195832","volume":"51","author":"M Farr\u00fas","year":"2018","unstructured":"Farr\u00fas, M.: Voice disguise in automatic speaker recognition. ACM Comput. Surv. 51(4), 681\u20136822 (2018)","journal-title":"ACM Comput. Surv."},{"key":"55_CR13","unstructured":"Alegre, F., Vipperla, R., Evans, N.W.D., Fauve, B.G.B.: On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals. In: Proceedings EUSIPCO, pp. 36\u201340 (2012)"},{"key":"55_CR14","doi-asserted-by":"crossref","unstructured":"Sahidullah, M., Kinnunen, T., Hanilci, C.: A comparison of features for synthetic speech detection. In: Proceedings INTERSPEECH, pp. 2087\u20132091 (2015)","DOI":"10.21437\/Interspeech.2015-472"},{"key":"55_CR15","doi-asserted-by":"crossref","unstructured":"Gomez-Alanis, A., et al.: Performance evaluation of front-and back-end techniques for ASV spoofing detection systems based on deep features. In: Proceedings IberSPEECH 2018, pp. 45\u201349 (2018)","DOI":"10.21437\/IberSPEECH.2018-10"},{"key":"55_CR16","doi-asserted-by":"crossref","unstructured":"Alam, M.J., Kenny, P., Bhattacharya, G., Stafylakis, T.: Development of crim system for the automatic speaker verification spoofing and countermeasures challenge 2015. In: Proceedings INTERSPEECH, pp. 2072\u20132076 (2015)","DOI":"10.21437\/Interspeech.2015-469"},{"key":"55_CR17","unstructured":"Kannangola, D., et al.: Factor analysis methods for joint speaker verification and spoof detection. In: Proceedings ICASSP, pp. 5385\u20135389 (2017)"},{"key":"55_CR18","doi-asserted-by":"crossref","unstructured":"Todisco, M., Delgado, H., Evans, N.: A new feature for automatic speaker verification anti-spoofing: constant Q cepstral coefficients. In: Proceedings Odyssey (2016)","DOI":"10.21437\/Odyssey.2016-41"},{"key":"55_CR19","doi-asserted-by":"crossref","unstructured":"Novoselov, S., Kozlov, A., Lavrentyeva, G., Simonchik, K., Shchemelinin, V.: STC anti-spoofing systems for the ASVspoof 2015 challenge. In: Proceedings IEEE International Conference Acoustics, Speech and Signal Processing (ICASSP), pp. 5475\u20135479 (2016)","DOI":"10.1109\/ICASSP.2016.7472724"},{"key":"55_CR20","doi-asserted-by":"crossref","unstructured":"Weng, S., et al.: The SYSU system for the interspeech 2015 automatic speaker verification spoofing and countermeasures challenge. In: Proceedings APSIPA, pp. 152\u2013155 (2015)","DOI":"10.1109\/APSIPA.2015.7415492"},{"issue":"1\u20133","key":"55_CR21","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"DA Reynolds","year":"2000","unstructured":"Reynolds, D.A., Quatieri, T.F., Dunn, R.B.: Speaker verification using adapted Gaussian mixture models. Digit. Signal Process. 10(1\u20133), 19\u201341 (2000)","journal-title":"Digit. Signal Process."},{"key":"55_CR22","doi-asserted-by":"crossref","unstructured":"Wang, L., Yoshida, Y., Kawakami, Y., Nakagawa, S.: Relative phase information for detecting human speech and spoofed speech. In: Proceedings INTERSPEECH, pp. 2092\u20132096 (2015)","DOI":"10.21437\/Interspeech.2015-473"},{"key":"55_CR23","unstructured":"Nanxin, C., et al.: Robust deep feature for spoofing detection\u2014The SJTU system for ASVspoof 2015 challenge. In: Sixteenth Annual Conference of the International Speech Communication Association (2015)"},{"issue":"4","key":"55_CR24","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1109\/TASL.2010.2064307","volume":"19","author":"N Dehak","year":"2011","unstructured":"Dehak, N., Kenny, P., Dehak, R., Dumouchel, P., Ouellet, P.: Front-end factor analysis for speaker verification. IEEE Trans. Audio Speech Lang. Process. 19(4), 788\u2013798 (2011)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"55_CR25","doi-asserted-by":"crossref","unstructured":"Kinnunen, T., et al.: t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification. In: Proceedings Odyssey, Les Sables d\u2019Olonne, France, June 2018","DOI":"10.21437\/Odyssey.2018-44"},{"key":"55_CR26","doi-asserted-by":"crossref","unstructured":"Hatch, A.O., Kajarekar, S.S., Stolcke, A.: Within-class covariance normalization for SVM-based speaker recognition. In: Proceedings ICSLP (2006)","DOI":"10.21437\/Interspeech.2006-183"},{"key":"55_CR27","doi-asserted-by":"crossref","unstructured":"Garcia-Romero, D., Espy-Wilson, C.Y.: Analysis of i-vector length normalization in speaker recognition systems. In: Proceedings INTERSPEECH, pp. 249\u2013252 (2011)","DOI":"10.21437\/Interspeech.2011-53"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31456-9_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T01:32:56Z","timestamp":1664587976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-31456-9_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030314552","9783030314569"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31456-9_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhuzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ccbr99.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}