{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:10:58Z","timestamp":1729635058466,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/biosig.2016.7736933","type":"proceedings-article","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T21:26:09Z","timestamp":1478553969000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Presentation Attack Detection Using Long-Term Spectral Statistics for Trustworthy Speaker Verification"],"prefix":"10.1109","author":[{"given":"Hannah","family":"Muckenhirn","sequence":"first","affiliation":[]},{"given":"Mathew","family":"Magimai-Doss","sequence":"additional","affiliation":[]},{"given":"Sebastien","family":"Marcel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2396517"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1328092"},{"key":"ref31","first-page":"209","article-title":"The quefrency alanysis of time series for echoes: Cepstrum, Pseudo-Autocovariance, Cross-Cepstrum and Saphe Cracking","author":"bogert","year":"1963","journal-title":"Proc Symp on Time Series Analysis"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6393(98)00033-8"},{"key":"ref37","article-title":"Development of CRIM system for the automatic speaker verification spoofing and countermeasures challenge 2015","author":"alam","year":"2015","journal-title":"Proc of Interspeech"},{"key":"ref36","article-title":"Spoofing speech detection using high dimensional magnitude and phase features: The NTU approach for asvspoof 2015 challenge","author":"xiao","year":"2015","journal-title":"Proc of Interspeech"},{"key":"ref35","article-title":"Robust deep feature for spoofing detection-the SJTU system for asvspoof 2015 challenge","author":"chen","year":"2015","journal-title":"Proc of Interspeech"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472724"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398812"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712706"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-41"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2012-135","article-title":"Synthetic speech discrimination using pitch pattern statistics derived from image analysis","author":"leon","year":"2012","journal-title":"Proc of Interspeech"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/E88-A.1.280"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639067"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-37"},{"key":"ref17","article-title":"Spoofing and countermeasures for speaker verification: a need for standard corpora, protocols and metrics","author":"evans","year":"2013","journal-title":"IEEE Speech and Language Technical Committee Newsletter"},{"key":"ref18","article-title":"Combining evidences from mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech","author":"patel","year":"2015","journal-title":"Proc of Interspeech"},{"key":"ref19","first-page":"5105","article-title":"Effectiveness of fundamental frequency (FO) and strength of excitation (SOE) for spoofed speech detection","author":"patel","year":"2016","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012213564-4\/50007-X"},{"year":"2016","key":"ref4","article-title":"DIS 30107&#x2013;1, information technology - biometrics presentation attack detection"},{"key":"ref27","first-page":"206","article-title":"Long-term average spectrum study on speaking voice qualityin male actors","volume":"93","author":"leino","year":"1993","journal-title":"Proc of the Stockholm Music Acoustics Conference"},{"key":"ref3","article-title":"ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge","author":"wu","year":"2015","journal-title":"Proc of Interspeech"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19530-3_25"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1981.1163530"},{"key":"ref5","article-title":"Can a professional imitator fool a gmm-based speaker verification system?","author":"mari\u00e9thoz","year":"2005","journal-title":"Idiap Idiap-RR Idiap-RR-24?2012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2011.6016982"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2012-465","article-title":"Detecting converted speech and natural speech for anti -spoofing attack in speaker recognition","author":"wu","year":"2012","journal-title":"Proc of Interspeech"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358783"},{"key":"ref20","article-title":"A comparison of features for synthetic speech detection","author":"sahidullah","year":"2015","journal-title":"Proc of Interspeech"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvoice.2004.02.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2016-1326"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1590\/S0104-56872006000100013","article-title":"The long-term average spectrum in research and in the clinical practice of speech therapists","volume":"18","author":"master","year":"2006","journal-title":"Pr&#x00F3;-Fono Revista de Atualiza&#x00E7;&#x00E3;o Cientifica"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"77","DOI":"10.3233\/NRE-141102","article-title":"Long-time average spectrum in individuals with parkinson disease","volume":"35","author":"smith","year":"2014","journal-title":"Neurorehabilitation"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0892-1997(01)00034-0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0892-1997(96)80019-1"}],"event":{"name":"2016 International Conference of the Biometrics Special Interest Group (BIOSIG)","start":{"date-parts":[[2016,9,21]]},"location":"Darmstadt, Germany","end":{"date-parts":[[2016,9,23]]}},"container-title":["2016 International Conference of the Biometrics Special Interest Group (BIOSIG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7736796\/7736893\/07736933.pdf?arnumber=7736933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T17:46:22Z","timestamp":1657647982000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7736933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/biosig.2016.7736933","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}