{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T16:54:41Z","timestamp":1762102481503},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/apsipaasc47483.2019.9023062","type":"proceedings-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T17:03:54Z","timestamp":1583514234000},"page":"838-843","source":"Crossref","is-referenced-by-count":3,"title":["Multi-band Spectral Entropy Information for Detection of Replay Attacks"],"prefix":"10.1109","author":[{"given":"Yitong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Rohan Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Haizhou","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2004.1325955"},{"key":"ref38","article-title":"Entropy based voice activity detection in very noisy conditions","author":"renevey","year":"0","journal-title":"Seventh European Conference on Speech Communication and Technology"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPA.2018.8659789"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1846"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPA.2018.8659537"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1981.1163530"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"journal-title":"Automatic Speech Recognition Understanding Workshop (ASRU) 2019 (Submitted)","article-title":"Long range acoustic and deep features perspective on ASVspoof 2019","year":"0","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-1887"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2019.02.018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref40","article-title":"Significance of subband features for synthetic speech decetion","author":"yang","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security (Accepted with Minor Revision)"},{"key":"ref11","first-page":"321","author":"sahidullah","year":"2019","journal-title":"Introduction to Voice Presentation Attack Detection and Recent Advances"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095943"},{"key":"ref13","first-page":"274","article-title":"Detecting replay attacks from far-field recordings on speaker verification systems","year":"2011","journal-title":"Biometrics and ID Management"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041636"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SPCOM.2016.7746646"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.12.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2671435"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/89.365379"},{"key":"ref4","article-title":"Speaker verification makes its debut in smartphone","author":"lee","year":"2013","journal-title":"SLTC Newsletter"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-42"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2462851"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-012-9160-6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"ref5","first-page":"3317","article-title":"Joint application of speech and speaker recognition for automation and security in smart home","author":"lee","year":"2011","journal-title":"InterSpeech"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-016-1148-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2014.6811345"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"ref9","article-title":"SpeechMarker: a voice based multi-level attendance application","author":"jelil","year":"2019","journal-title":"Interspeech 2019"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628714"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1980.1163420"},{"key":"ref20","first-page":"283","article-title":"A new feature for automatic speaker verification anti-spoofing: Constant Q cepstral coefficients","year":"2016","journal-title":"Odyssey 2016"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1121\/1.4954653"},{"key":"ref22","first-page":"22","article-title":"Spoof detection using source, instantaneous frequency and cepstral features","author":"jelil","year":"0","journal-title":"Proc Interspeech 2017"},{"key":"ref21","first-page":"7","article-title":"Experimental analysis of features for replay attack detection results on the ASVspoof 2017 challenge","author":"font","year":"0","journal-title":"Proc Interspeech 2017"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953187"},{"key":"ref24","first-page":"27","article-title":"Audio replay attack detection using high-frequency features","author":"witkowski","year":"0","journal-title":"Proc Interspeech 2017"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415098"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1362"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1836","DOI":"10.21437\/Interspeech.2014-417","article-title":"Combining source and system information for limited data speaker verification","author":"das","year":"2014","journal-title":"INTERSPEECH 2014 Singapore"},{"key":"ref26","first-page":"1195","article-title":"In-vestigating the use of scattering coefficients for replay attack detection","author":"sriskandaraja","year":"0","journal-title":"Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) 2017"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.1995.526613"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSLP.2018.8706672"}],"event":{"name":"2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2019,11,18]]},"location":"Lanzhou, China","end":{"date-parts":[[2019,11,21]]}},"container-title":["2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8989870\/9023008\/09023062.pdf?arnumber=9023062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T21:51:45Z","timestamp":1666043505000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9023062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/apsipaasc47483.2019.9023062","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}