{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T19:06:11Z","timestamp":1761419171820,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T00:00:00Z","timestamp":1504569600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ftirma Kurumu","doi-asserted-by":"publisher","award":["115E916"],"award-info":[{"award-number":["115E916"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-017-5181-0","type":"journal-article","created":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T12:07:35Z","timestamp":1504613255000},"page":"16099-16111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Linear prediction residual features for automatic speaker verification anti-spoofing"],"prefix":"10.1007","volume":"77","author":[{"given":"Cemal","family":"Hanil\u00e7i","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,5]]},"reference":[{"key":"5181_CR1","doi-asserted-by":"crossref","unstructured":"Bhavsar HN, Patel TB, Patil HA (2016) Novel nonlinear prediction based features for spoofed speech detection. In: Proceedings of INTERSPEECH, pp 155\u2013159","DOI":"10.21437\/Interspeech.2016-1002"},{"key":"5181_CR2","doi-asserted-by":"crossref","unstructured":"Bonastre J, Matrouf D, Fredouille C (2007) Artificial impostor voice transformation effects on false acceptance rates. In: Proceedings of INTERSPEECH, pp 2053\u20132056","DOI":"10.21437\/Interspeech.2007-173"},{"key":"5181_CR3","doi-asserted-by":"crossref","unstructured":"Ergu\u0307nay SK, Khoury E, Lazaridis A, Marcel S (2015) On the vulnerability of speaker verification to realistic voice spoofing. In: Proceedings of BTAS, pp 1\u20136","DOI":"10.1109\/BTAS.2015.7358783"},{"key":"5181_CR4","doi-asserted-by":"crossref","unstructured":"Evans NWD, Kinnunen T, Yamagishi J, Wu Z, Alegre F, Leon PLD (2014) Speaker recognition anti-spoofing. In: Handbook of biometric anti-spoofing - trusted biometrics under spoofing attacks, pp 125\u2013146","DOI":"10.1007\/978-1-4471-6524-8_7"},{"key":"5181_CR5","doi-asserted-by":"crossref","unstructured":"Fukada T, Tokuda K, Kobayashi T, Imai S (1992) An adaptive algorithm for mel-cepstral analysis of speech. In: Proceedings of ICASSP, vol 1, pp 137\u2013140","DOI":"10.1109\/ICASSP.1992.225953"},{"key":"5181_CR6","doi-asserted-by":"crossref","unstructured":"Hanil\u00e7i C., Kinnunen T, Sahidullah M (2015) Classifiers for synthetic speech detection: a comparison. In: Proceedings of INTERSPEECH, pp 2057\u20132061","DOI":"10.21437\/Interspeech.2015-466"},{"key":"5181_CR7","doi-asserted-by":"crossref","unstructured":"Hautama\u0307ki RG, Kinnunen T, Hautama\u0307ki V, Leino T, Laukkanen A (2013) I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry. In: Proceedings of INTERSPEECH, pp 930\u2013934","DOI":"10.21437\/Interspeech.2013-289"},{"key":"5181_CR8","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.specom.2015.05.002","volume":"72","author":"RG Hautama\u0307ki","year":"2015","unstructured":"Hautama\u0307ki RG, Kinnunen T, Hautama\u0307ki V, Leino T, Laukkanen A (2015) Automatic versus human speaker verification: the case of voice mimicry. Speech Comm 72:13\u201331","journal-title":"Speech Comm"},{"issue":"2","key":"5181_CR9","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"AK Jain","year":"2006","unstructured":"Jain AK, Ross A, Pankanti S (2006) Biometrics: a tool for information security. IEEE, Transactions on Information Forensics and Security 1(2):125\u2013143","journal-title":"IEEE, Transactions on Information Forensics and Security"},{"key":"5181_CR10","doi-asserted-by":"crossref","unstructured":"Janicki A (2015) Spoofing countermeasure based on analysis of linear prediction error. In: Proceedings of INTERSPEECH, pp 2077\u20132081","DOI":"10.21437\/Interspeech.2015-470"},{"key":"5181_CR11","doi-asserted-by":"crossref","unstructured":"Janicki A (2017) Increasing anti-spoofing protection in speaker verification using linear prediction. Multimedia Tools and Applications 76(6):9017\u20139032","DOI":"10.1007\/s11042-016-3508-x"},{"issue":"3\u20134","key":"5181_CR12","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/S0167-6393(98)00085-5","volume":"27","author":"H Kawahara","year":"1999","unstructured":"Kawahara H, Masuda-Katsuse I, de Cheveigne A (1999) Restructuring speech representations using a pitch-adaptive time\u2013frequency smoothing and an instantaneous-frequency-based {F0} extraction: Possible role of a repetitive structure in sounds. Speech Communication 27(3\u20134):187\u2013207","journal-title":"Speech Communication"},{"issue":"1","key":"5181_CR13","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.specom.2009.08.009","volume":"52","author":"T Kinnunen","year":"2010","unstructured":"Kinnunen T, Li H (2010) An overview of text-independent speaker recognition: from features to supervectors. Speech Comm 52(1):12\u201340","journal-title":"Speech Comm"},{"issue":"4","key":"5181_CR14","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.patrec.2008.11.007","volume":"30","author":"T Kinnunen","year":"2009","unstructured":"Kinnunen T, Saastamoinen J, Hautama\u0307ki V., Vinni M, Fra\u0307nti P (2009) Comparative evaluation of maximum a posteriori vector quantization and gaussian mixture models in speaker verification. Pattern Recogn Lett 30(4):341\u2013347","journal-title":"Pattern Recogn Lett"},{"key":"5181_CR15","doi-asserted-by":"crossref","unstructured":"Kinnunen T, Wu ZZ, Lee KA, Sedlak F, Chng ES, Li H (2012) Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech. In: Proceedings of ICASSP, pp 4401\u20134404","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"5181_CR16","first-page":"172","volume-title":"Anti-spoofing methods for automatic speaker verification system","author":"G Lavrentyeva","year":"2017","unstructured":"Lavrentyeva G, Novoselov S, Simonchik K (2017) Anti-spoofing methods for automatic speaker verification system. Springer International Publishing, Cham, pp 172\u2013184"},{"key":"5181_CR17","unstructured":"Leon PLD, Apsingekar VR, Pucher M, Yamagishi J (2010) Revisiting the security of speaker verification systems against imposture using synthetic speech. In: Proceedings of ICASSP, pp 1798\u20131801"},{"key":"5181_CR18","unstructured":"Leon PLD, Pucher M, Yamagishi J (2010) Evaluation of the vulnerability of speaker verification to synthetic speech. In: Proceedings of Odyssey, p 28"},{"issue":"4","key":"5181_CR19","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/PROC.1975.9792","volume":"63","author":"J Makhoul","year":"1975","unstructured":"Makhoul J (1975) Linear prediction: a tutorial review. Proc IEEE 63(4):561\u2013580","journal-title":"Proc IEEE"},{"key":"5181_CR20","doi-asserted-by":"crossref","unstructured":"Martin A, Doddington G, Kamm T, Ordowski M, Przybocki M (1997) The det curve in assessment of detection task performance. In: Proceedings of EUROSPEECH, pp 1895\u20131898","DOI":"10.21437\/Eurospeech.1997-504"},{"issue":"1","key":"5181_CR21","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/LSP.2005.860538","volume":"13","author":"KSR Murty","year":"2006","unstructured":"Murty KSR, Yegnanarayana B (2006) Combining evidence from residual phase and mfcc features for speaker recognition. IEEE Signal Process Lett 13(1):52\u201355","journal-title":"IEEE Signal Process Lett"},{"issue":"C","key":"5181_CR22","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.csl.2016.06.002","volume":"41","author":"D Nandi","year":"2017","unstructured":"Nandi D, Pati D, Rao KS (2017) Implicit processing of lp residual for language identification. Comput Speech Lang 41(C):68\u201387","journal-title":"Comput Speech Lang"},{"key":"5181_CR23","doi-asserted-by":"crossref","unstructured":"Novoselov S, Kozlov A, Lavrentyeva G, Simonchik K, Shchemelinin V (2016) STC anti-spoofing systems for the ASVspoof 2015 challenge, pp 5475\u20135479","DOI":"10.1109\/ICASSP.2016.7472724"},{"issue":"1","key":"5181_CR24","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10772-010-9087-8","volume":"14","author":"D Pati","year":"2011","unstructured":"Pati D, Prasanna SRM (2011) Subsegmental, segmental and suprasegmental processing of linear prediction residual for speaker information. Int J Speech Technol 14(1):49\u201364","journal-title":"Int J Speech Technol"},{"key":"5181_CR25","volume-title":"Theory and applications of digital speech processing","author":"L Rabiner","year":"2010","unstructured":"Rabiner L, Schafer R (2010) Theory and applications of digital speech processing, 1st edn. Prentice Hall Press, Upper Saddle River","edition":"1"},{"issue":"3","key":"5181_CR26","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM, Syst J 40(3):614\u2013634","journal-title":"IBM, Syst J"},{"issue":"1","key":"5181_CR27","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/89.365379","volume":"3","author":"DA Reynolds","year":"1995","unstructured":"Reynolds DA, Rose RC (1995) Robust text-independent speaker identification using gaussian mixture speaker models. IEEE Transactions on Speech and Audio Processing 3(1):72\u201383","journal-title":"IEEE Transactions on Speech and Audio Processing"},{"key":"5181_CR28","doi-asserted-by":"crossref","unstructured":"Sahidullah M, Kinnunen T, Hanil\u00e7i C. (2015) A comparison of features for synthetic speech detection. In: Proceedings of INTERSPEECH, pp 2087\u20132091","DOI":"10.21437\/Interspeech.2015-472"},{"issue":"4","key":"5181_CR29","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TIFS.2015.2398812","volume":"10","author":"J Sa\u0307nchez","year":"2015","unstructured":"Sa\u0307nchez J., Saratxaga I, Herna\u0307ez I., Navas E, Erro D, Raitio T (2015) Toward a universal synthetic speech spoofing detection using phase information. IEEE, Transactions on Information Forensics and Security 10(4):810\u2013820","journal-title":"IEEE, Transactions on Information Forensics and Security"},{"key":"5181_CR30","doi-asserted-by":"crossref","unstructured":"Todisco M, Delgado H, Evans N (2016) A new feature for automatic speaker verification anti-spoofing: constant Q cepstral coefficients. In: Proceedings of Odyssey, pp 283\u2013290","DOI":"10.21437\/Odyssey.2016-41"},{"key":"5181_CR31","unstructured":"Villalba JA, Lleida E (2010) Speaker verification performance degradation against spoofing and tampering attacks. In: Proceedings of FALA, pp 131\u2013134"},{"key":"5181_CR32","doi-asserted-by":"crossref","unstructured":"Villalba JA, Miguel A, Ortega A, Lleida E (2015) Spoofing detection with DNN and one-class SVM for the ASVspoof 2015 challenge. In: Proceedings of INTERSPEECH, pp 2067\u20132071","DOI":"10.21437\/Interspeech.2015-468"},{"key":"5181_CR33","doi-asserted-by":"crossref","unstructured":"Wang L, Yoshida Y, Kawakami Y, Nakagawa S (2015) Relative phase information for detecting human speech and spoofed speech. In: Proceedings of INTERSPEECH, pp 2092\u20132096","DOI":"10.21437\/Interspeech.2015-473"},{"key":"5181_CR34","doi-asserted-by":"crossref","unstructured":"Wu Z, Li H (2014) Voice conversion versus speaker verification: an overview. APSIPA Transactions on Audio Signal and Information Processing 3(e17)","DOI":"10.1017\/ATSIP.2014.17"},{"key":"5181_CR35","doi-asserted-by":"crossref","unstructured":"Wu Z, Siong CE, Li H (2012) Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition. In: Proceedings of INTERSPEECH, pp 1700\u20131703","DOI":"10.21437\/Interspeech.2012-465"},{"key":"5181_CR36","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.specom.2014.10.005","volume":"66","author":"Z Wu","year":"2015","unstructured":"Wu Z, Evans N, Kinnunen T, Yamagishi J, Alegre F, Li H (2015) Spoofing and countermeasures for speaker verification: a survey. Speech Comm 66:130\u2013153","journal-title":"Speech Comm"},{"key":"5181_CR37","doi-asserted-by":"crossref","unstructured":"Wu Z, Kinnunen T, Evans N, Yamagishi J, Hanil\u00e7i C., Sahidullah M, Sizov A (2015) ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. In: Proceedings of INTERSPEECH, pp 2037\u20132041","DOI":"10.21437\/Interspeech.2015-462"},{"issue":"4","key":"5181_CR38","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1109\/JSTSP.2017.2671435","volume":"11","author":"Z Wu","year":"2017","unstructured":"Wu Z, Yamagishi J, Kinnunen T, Hanil\u00e7i C, Sahidullah M, Sizov A, Evans N, Todisco M (2017) Asvspoof: The automatic speaker verification spoofing and countermeasures challenge. IEEE Journal of Selected Topics in Signal Processing 11(4):588\u2013604","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"5181_CR39","doi-asserted-by":"crossref","unstructured":"Xiao X, Tian X, Du S, Xu H, Chng ES, Li H (2015) Spoofing speech detection using high dimensional magnitude and phase features: The NTU approach for ASVspoof 2015 challenge. In: Proceedings of INTERSPEECH, pp 2052\u20132056","DOI":"10.21437\/Interspeech.2015-465"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5181-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5181-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5181-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T05:50:57Z","timestamp":1659419457000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5181-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,5]]},"references-count":39,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["5181"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5181-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2017,9,5]]}}}