{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T07:46:48Z","timestamp":1760255208461,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032079558","type":"print"},{"value":"9783032079565","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07956-5_24","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T07:19:34Z","timestamp":1760253574000},"page":"333-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Audio Replay Attack Detection with\u00a0Silence-Based Blind Channel Impulse Response Estimation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9002-7896","authenticated-orcid":false,"given":"\u015eule","family":"Bekiryaz\u0131c\u0131","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9174-0367","authenticated-orcid":false,"given":"Cemal","family":"Hanil\u00e7i","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5513-9072","authenticated-orcid":false,"given":"Neyir","family":"Ozcan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"24_CR1","unstructured":"Alegre, F., Vipperla, R., Evans, N., Fauve, B.: On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals. In: Proceedings of the EUSIPCO, pp. 36\u201340 (2012)"},{"key":"24_CR2","doi-asserted-by":"publisher","unstructured":"Alzantot, M., Wang, Z., Srivastava, M.: Deep residual neural networks for audio spoofing detection. In: Proceedings of the Interspeech (2019). https:\/\/doi.org\/10.48550\/arXiv.1907.00501","DOI":"10.48550\/arXiv.1907.00501"},{"key":"24_CR3","doi-asserted-by":"publisher","unstructured":"Avila, A.R., Alam, J., O\u2019Shaughnessy, D., Falk, T.H.: Blind channel response estimation for replay attack detection. In: Proceedings of the Interspeech, pp. 2893\u20132897 (2019). https:\/\/doi.org\/10.21437\/Interspeech.2019-2956","DOI":"10.21437\/Interspeech.2019-2956"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"101163","DOI":"10.1016\/j.csl.2020.101163","volume":"66","author":"AR Avila","year":"2021","unstructured":"Avila, A.R., Alam, J., Prado, F.O.C., O\u2019Shaughnessy, D., Falk, T.H.: On the use of blind channel response estimation and a residual neural network to detect physical access attacks to speaker verification systems. Comput. Speech Lang. 66, 101163 (2021). https:\/\/doi.org\/10.1016\/j.csl.2020.101163","journal-title":"Comput. Speech Lang."},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"171","DOI":"10.2299\/jsp.26.171","volume":"26","author":"A Chaiwongyen","year":"2022","unstructured":"Chaiwongyen, A., Doungpummet, S., Karnjana, J., Kongprawechnon, W., Unoki, M.: Replay attack detection in automatic speaker verification using gammatone cepstral coefficients and ResNet-based model. J. Signal Process. 26, 171\u2013175 (2022). https:\/\/doi.org\/10.2299\/jsp.26.171","journal-title":"J. Signal Process."},{"key":"24_CR6","doi-asserted-by":"publisher","unstructured":"Chang, S.Y., Wu, K.C., Chen, C.P.: Transfer-representation learning for detecting spoofing attacks with converted and synthesized speech in automatic speaker verification system. In: Proceedings of the Interspeech, pp. 1063\u20131067 (2019). https:\/\/doi.org\/10.21437\/Interspeech.2019-2014","DOI":"10.21437\/Interspeech.2019-2014"},{"key":"24_CR7","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1109\/TASLP.2020.3036777","volume":"28","author":"B Chettri","year":"2020","unstructured":"Chettri, B., Benetos, E., Sturm, B.L.T.: Dataset artefacts in anti-spoofing systems: a case study on the ASVspoof 2017 benchmark. IEEE\/ACM Trans. Audio Speech Lang. Process. 28, 3018\u20133028 (2020). https:\/\/doi.org\/10.1109\/TASLP.2020.3036777","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"101092","DOI":"10.1016\/j.csl.2020.101092","volume":"63","author":"B Chettri","year":"2020","unstructured":"Chettri, B., Kinnunen, T., Benetos, E.: Deep generative variational autoencoding for replay spoof detection in automatic speaker verification. Comput. Speech Lang. 63, 101092 (2020). https:\/\/doi.org\/10.1016\/j.csl.2020.101092","journal-title":"Comput. Speech Lang."},{"key":"24_CR9","doi-asserted-by":"publisher","unstructured":"Chettri, B., Mishra, S., Sturm, B., Benetos, E.: Analysing the predictions of a CNN-based replay spoofing detection system. In: Proceedings of the SLT, pp. 92\u201397 (12 2018). https:\/\/doi.org\/10.1109\/SLT.2018.8639666","DOI":"10.1109\/SLT.2018.8639666"},{"key":"24_CR10","doi-asserted-by":"publisher","unstructured":"Chettri, B., Stoller, D., Morfi, V., Ram\u00edrez, M.A.M., Benetos, E., Sturm, B.L.: Ensemble models for spoofing detection in automatic speaker verification. In: Proceedings of the Interspeech, pp. 1018\u20131022 (2019). https:\/\/doi.org\/10.21437\/Interspeech.2019-2505","DOI":"10.21437\/Interspeech.2019-2505"},{"key":"24_CR11","doi-asserted-by":"publisher","unstructured":"Chettri, B., Sturm, B.L.: A deeper look at gaussian mixture model based anti-spoofing systems. In: Proceedings of the ICASSP, pp. 5159\u20135163 (2018). https:\/\/doi.org\/10.1109\/ICASSP.2018.8461467","DOI":"10.1109\/ICASSP.2018.8461467"},{"issue":"10","key":"24_CR12","doi-asserted-by":"publisher","first-page":"2162","DOI":"10.1109\/TASL.2013.2270406","volume":"21","author":"ND Gaubitch","year":"2013","unstructured":"Gaubitch, N.D., Brookes, M., Naylor, P.A.: Blind channel magnitude response estimation in speech using spectrum classification. IEEE\/ACM Trans. Audio Speech Lang. Process. 21(10), 2162\u20132171 (2013). https:\/\/doi.org\/10.1109\/TASL.2013.2270406","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"24_CR13","doi-asserted-by":"publisher","unstructured":"Gupta, P., Patil, H.A., Guido, R.C.: Vulnerability issues in automatic speaker verification (ASV) systems. EURASIP J. Audio Speech Music Process. 2024(1) (2024). https:\/\/doi.org\/10.1186\/s13636-024-00328-8","DOI":"10.1186\/s13636-024-00328-8"},{"key":"24_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.dsp.2014.08.008","volume":"35","author":"C Hanil\u00e7i","year":"2014","unstructured":"Hanil\u00e7i, C., Kinnunen, T.: Source cell-phone recognition from recorded speech using non-speech segments. Digit. Signal Process. 35, 75\u201385 (2014)","journal-title":"Digit. Signal Process."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Kinnunen, T., et al.: t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification. arXiv:1804.09618 (2018)","DOI":"10.21437\/Odyssey.2018-44"},{"issue":"4","key":"24_CR16","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.patrec.2008.11.007","volume":"30","author":"T Kinnunen","year":"2009","unstructured":"Kinnunen, T., Saastamoinen, J., Hautam\u00e4ki, V., Vinni, M., Fr\u00e4nti, P.: Comparative evaluation of maximum a posteriori vector quantization and gaussian mixture models in speaker verification. Pattern Recogn. Lett. 30(4), 341\u2013347 (2009)","journal-title":"Pattern Recogn. Lett."},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Lavrentyeva, G., Malykh, V., Novoselov, S., Kozlov, A., Kudashev, O., Gorlanov, A.: Audio replay attack detection with deep learning frameworks. In: Proceedings of the Interspeech, pp. 82\u201386 (2017)","DOI":"10.21437\/Interspeech.2017-360"},{"key":"24_CR18","doi-asserted-by":"publisher","unstructured":"Lavrentyeva, G., Novoselov, S., Andzhukaev, T., Volkova, M., Gorlanov, A., Kozlov, A.: STC antispoofing systems for the asvspoof2019 challenge. In: Proceedings of the Interspeech, pp. 1033\u20131037 (2019). https:\/\/doi.org\/10.21437\/Interspeech.2019-1768","DOI":"10.21437\/Interspeech.2019-1768"},{"key":"24_CR19","doi-asserted-by":"publisher","unstructured":"Lei, Z., Yan, H., Liu, C., Ma, M., Yang, Y.: Two-path GMM-ResNet and GMM-SeNet for ASV spoofing detection. In: Proceedings of the ICASSP, pp. 6377\u20136381 (2022). https:\/\/doi.org\/10.1109\/ICASSP43922.2022.9746163","DOI":"10.1109\/ICASSP43922.2022.9746163"},{"key":"24_CR20","doi-asserted-by":"publisher","unstructured":"Li, R., Zhao, M., Li, Z., Li, L., Hong, Q.: Anti-spoofing speaker verification system with multi-feature integration and multi-task learning. In: Proceedings of the Interspeech, pp. 1048\u20131052 (2019). https:\/\/doi.org\/10.21437\/Interspeech.2019-1698","DOI":"10.21437\/Interspeech.2019-1698"},{"key":"24_CR21","doi-asserted-by":"publisher","unstructured":"Li, X., et al.: Replay and synthetic speech detection with res2net architecture. In: Proceedings of the ICASSP, pp. 6354\u20136358 (2021). https:\/\/doi.org\/10.1109\/ICASSP39728.2021.9413828","DOI":"10.1109\/ICASSP39728.2021.9413828"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Replay and synthetic speech detection with res2net architecture. In: Proceedings of the ICASSP, pp. 6359\u20136363 (2021)","DOI":"10.1109\/ICASSP39728.2021.9413828"},{"key":"24_CR23","doi-asserted-by":"publisher","unstructured":"Liu, X., et al.: ASVspoof 2021: towards spoofed and deepfake speech detection in the wild. IEEE\/ACM Trans. Audio Speech Lang. Process. 1\u201314 (2023). https:\/\/doi.org\/10.1109\/TASLP.2023.3285283","DOI":"10.1109\/TASLP.2023.3285283"},{"key":"24_CR24","unstructured":"van\u00a0der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(86), 2579\u20132605 (2008). http:\/\/jmlr.org\/papers\/v9\/vandermaaten08a.html"},{"key":"24_CR25","doi-asserted-by":"publisher","unstructured":"Mon, K.Z., Galajit, K., Mawalim, C.O., Karnjana, J., Isshiki, T., Aimmanee, P.: Spoof detection using voice contribution on LFCC features and ResNet-34. In: 18th International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP), pp.\u00a01\u20136 (2023). https:\/\/doi.org\/10.1109\/iSAI-NLP60301.2023.10354625","DOI":"10.1109\/iSAI-NLP60301.2023.10354625"},{"key":"24_CR26","doi-asserted-by":"publisher","unstructured":"Patil, H.A., Kamble, M.R.: A survey on replay attack detection for automatic speaker verification (ASV) system. In: Proceedings of the APSIPA ASC, pp. 1047\u20131053 (2018). https:\/\/doi.org\/10.23919\/APSIPA.2018.8659666","DOI":"10.23919\/APSIPA.2018.8659666"},{"key":"24_CR27","doi-asserted-by":"publisher","unstructured":"Tato, A.A.N., Nkambou, R.: Improving Adam optimizer. In: Proceedings of the International Conference on Learning Representations (2018). https:\/\/doi.org\/10.13140\/RG.2.2.21344.43528","DOI":"10.13140\/RG.2.2.21344.43528"},{"key":"24_CR28","doi-asserted-by":"publisher","first-page":"101114","DOI":"10.1016\/j.csl.2020.101114","volume":"64","author":"X Wang","year":"2020","unstructured":"Wang, X., et al.: ASVspoof 2019: a large-scale public database of synthesized, converted and replayed speech. Comput. Speech Lang. 64, 101114 (2020). https:\/\/doi.org\/10.1016\/j.csl.2020.101114","journal-title":"Comput. Speech Lang."},{"key":"24_CR29","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"Z Wu","year":"2014","unstructured":"Wu, Z., Evans, N., Kinnunen, T., Yamagishi, J., Alegre, F., Li, H.: Spoofing and countermeasures for speaker verification: a survey. Speech Commun. 66, 130\u2013153 (2014). https:\/\/doi.org\/10.1016\/j.specom.2014.10.005","journal-title":"Speech Commun."},{"key":"24_CR30","doi-asserted-by":"publisher","unstructured":"Yang, Y., et al.: The SJTU robust anti-spoofing system for the ASVspoof 2019 challenge. In: Proceedings of the Interspeech, pp. 1038\u20131042 (2019). https:\/\/doi.org\/10.21437\/Interspeech.2019-2170","DOI":"10.21437\/Interspeech.2019-2170"}],"container-title":["Lecture Notes in Computer Science","Speech and Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07956-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T07:19:36Z","timestamp":1760253576000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07956-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032079558","9783032079565"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07956-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPECOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Speech and Computer","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Szeged","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hungary","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"specom2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/specom.inf.u-szeged.hu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}