{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:11:44Z","timestamp":1760710304383},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s00034-020-01501-y","type":"journal-article","created":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T18:03:31Z","timestamp":1595095411000},"page":"872-889","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Novel Approach Towards Generalization of Countermeasure for Spoofing Attack on ASV Systems"],"prefix":"10.1007","volume":"40","author":[{"given":"Suvidha","family":"Rupesh Kumar","sequence":"first","affiliation":[]},{"given":"B.","family":"Bharathi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"issue":"3","key":"1501_CR1","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TSMCC.2002.804448","volume":"32","author":"M Basu","year":"2002","unstructured":"M. Basu, Gaussian-based edge-detection methods\u2014a survey. IEEE Trans.on Syst. Man Cybern. Part C (Appl. Rev.) 32(3), 252\u2013260 (2002)","journal-title":"IEEE Trans.on Syst. Man Cybern. Part C (Appl. Rev.)"},{"issue":"9","key":"1501_CR2","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/5.628714","volume":"85","author":"JP Campbell","year":"1997","unstructured":"J.P. Campbell, Speaker recognition: a tutorial. Proc. IEEE 85(9), 1437\u20131462 (1997)","journal-title":"Proc. IEEE"},{"key":"1501_CR3","doi-asserted-by":"crossref","unstructured":"B. Chettri, B.L. Sturm, E. Benetos, Analysing replay spoofing countermeasure performance under varied conditions, in 2018 IEEE 28th International Workshop on Machine Learning for Signal Processing (MLSP) (2018), pp. 1\u20136","DOI":"10.1109\/MLSP.2018.8516968"},{"issue":"05","key":"1501_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.2478\/ecce-2014-0009","volume":"5","author":"D Eringis","year":"2014","unstructured":"D. Eringis, G. Tamulevi\u010dius, Improving speech recognition rate through analysis parameters. Electr. Control Commun. Eng. 5(05), 61\u201365 (2014). https:\/\/doi.org\/10.2478\/ecce-2014-0009","journal-title":"Electr. Control Commun. Eng."},{"key":"1501_CR5","unstructured":"N.\u00a0Evans, T.\u00a0Kinnunen, J.\u00a0Yamagishi, Spoofing and countermeasures for automatic speaker verification, in Proceedings of the Annual Conference of the International Speech Communication Association, Interspeech (2013), pp. 925\u2013929"},{"key":"1501_CR6","first-page":"39","volume":"32","author":"D Gillespie","year":"2004","unstructured":"D. Gillespie, Detection and classification of right whale calls using an edge detector operating on a smoothed spectrogram. Proc. Can. Acoust. 32, 39\u201347 (2004)","journal-title":"Proc. Can. Acoust."},{"key":"1501_CR7","doi-asserted-by":"crossref","unstructured":"T. Kinnunen, M. Sahidullah, H. Delgado, M. Todisco, N. Evans, J. Yamagishi, K.A. Lee, The ASVspoof 2017 challenge: assessing the limits of replay spoofing attack detection, in Interspeech 2017, Annual Conference of the International Speech Communication Association, August 20\u201324, 2017, Stockholm, Sweden, Stockholm, Sweden (2017). http:\/\/www.eurecom.fr\/publication\/5235","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"1501_CR8","doi-asserted-by":"crossref","unstructured":"T. Kinnunen, K. Lee, H. Delgado, N. Evans, M. Todisco, M. Sahidullah, J. Yamagishi, D. Reynolds, t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification, in Proceedings of Odyssey: The Speaker and Language Recognition Workshop (2018)","DOI":"10.21437\/Odyssey.2018-44"},{"key":"1501_CR9","doi-asserted-by":"publisher","unstructured":"G.\u00a0Lavrentyeva, S.\u00a0Novoselov, E.\u00a0Malykh, A.\u00a0Kozlov, O.\u00a0Kudashev, V.\u00a0Shchemelinin, Audio replay attack detection with deep learning frameworks, in Interspeech (2017), pp. 82\u201386. https:\/\/doi.org\/10.21437\/Interspeech.2017-360","DOI":"10.21437\/Interspeech.2017-360"},{"key":"1501_CR10","doi-asserted-by":"crossref","unstructured":"Y. Liu, Y. Tian, L. He, J. Liu, M. Johnson, Simultaneous utilization of spectral magnitude and phase information to extract supervectors for speaker verification anti-spoofing, in Sixteenth Annual Conference of the International Speech Communication Association (2015)","DOI":"10.21437\/Interspeech.2015-471"},{"issue":"11","key":"1501_CR11","first-page":"23","volume":"8","author":"D Lyon","year":"2009","unstructured":"D. Lyon, The discrete Fourier transform, part 4: spectral leakage. J. Object Technol. 8(11), 23\u201334 (2009)","journal-title":"J. Object Technol."},{"key":"1501_CR12","doi-asserted-by":"publisher","unstructured":"K.\u00a0Madhu, H.\u00a0Patil, Analysis of reverberation via Teager energy features for replay spoof speech detection, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK (2019), pp. 2607\u20132611. https:\/\/doi.org\/10.1109\/ICASSP.2019.8683830","DOI":"10.1109\/ICASSP.2019.8683830"},{"key":"1501_CR13","unstructured":"T.\u00a0Patel, H.\u00a0Patil, Combining evidences from mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech, in Interspeech 2015, 16th Annual Conference of the International Speech Communication Association, Dresden, Germany, September 6\u201310, 2015 (2015), pp. 2062\u20132066"},{"key":"1501_CR14","doi-asserted-by":"crossref","unstructured":"D.S. Prabha, J.S. Kumar, Performance analysis of image smoothing methods for low level of distortion, in EEE International Conference on Advances in Computer Applications (ICACA), Coimbatore (2016), pp. 372\u2013376","DOI":"10.1109\/ICACA.2016.7887983"},{"key":"1501_CR15","doi-asserted-by":"publisher","unstructured":"M.\u00a0Sahidullah, H.\u00a0Delgado, M.\u00a0Todisco, H.\u00a0Yu, T.\u00a0Kinnunen, N.\u00a0Evans, Z.H.\u00a0Tan, Integrated spoofing countermeasures and automatic speaker verification: an evaluation on asvspoof 2015, in Interspeech (2016), pp. 1700\u20131704. https:\/\/doi.org\/10.21437\/Interspeech.2016-1280","DOI":"10.21437\/Interspeech.2016-1280"},{"key":"1501_CR16","doi-asserted-by":"crossref","unstructured":"A.\u00a0Sathya, J.\u00a0Swetha, K.A. Das, K.K. George, C.S. Kumar, J.\u00a0Aravinth, Robust features for spoofing detection, in 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2016), pp. 2410\u20132414","DOI":"10.1109\/ICACCI.2016.7732417"},{"key":"1501_CR17","doi-asserted-by":"crossref","unstructured":"M. Todisco, X. Wang, V. Vestman, M. Sahidullah, H. Delgado, A. Nautsch, J. Yamagishi, N. Evans, T. Kinnunen, K. Lee, Asvspoof 2019: future horizons in spoofed and fake audio detection. Interspeech (2019)","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"1501_CR18","doi-asserted-by":"crossref","unstructured":"Z.\u00a0Wu, E.\u00a0Chng, H.\u00a0Li, Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition, in 13th Annual Conference of the International Speech Communication Association, Interspeech 2012 (2012)","DOI":"10.21437\/Interspeech.2012-465"},{"key":"1501_CR19","doi-asserted-by":"crossref","unstructured":"Z.\u00a0Wu, S.\u00a0Gao, E.S. Cling, H.\u00a0Li, A study on replay attack and anti-spoofing for text-dependent speaker verification, in Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia\u2013Pacific (2014), pp. 1\u20135","DOI":"10.1109\/APSIPA.2014.7041636"},{"key":"1501_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005","author":"Z Wu","year":"2015","unstructured":"Z. Wu, N. Evans, T. Kinnunen, J. Yamagishi, F. Alegre, H. Li, Spoofing and countermeasures for speaker verification: a survey. Speech Commun. (2015). https:\/\/doi.org\/10.1016\/j.specom.2014.10.005","journal-title":"Speech Commun."},{"key":"1501_CR21","unstructured":"Z.\u00a0Wu, T.\u00a0Kinnunen, N.\u00a0Evans, J.\u00a0Yamagishi, C.\u00a0Hanil\u00e7i, M.\u00a0Sahidullah, Asvspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge, in Interspeech (2015), pp. 2037\u20132041"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-020-01501-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-020-01501-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-020-01501-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T07:01:30Z","timestamp":1667458890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-020-01501-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["1501"],"URL":"https:\/\/doi.org\/10.1007\/s00034-020-01501-y","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"14 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}