{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T00:40:08Z","timestamp":1746319208386,"version":"3.40.4"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/icassp.2014.6853696","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T19:23:23Z","timestamp":1406661803000},"page":"749-753","source":"Crossref","is-referenced-by-count":7,"title":["Evasion and obfuscation in automatic speaker verification"],"prefix":"10.1109","author":[{"given":"Federico","family":"Alegre","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Soldi","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Evans","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1659966"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638211"},{"key":"18","article-title":"A straightforward and efficient implementation of the factor analysis model for speaker verification","author":"matrouf","year":"2007","journal-title":"Proc INTERSPEECH"},{"key":"15","first-page":"131","article-title":"Speaker verification performance degradation against spoofing and tampering attacks","author":"villalba","year":"2010","journal-title":"FAlA Workshop"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4960482"},{"key":"13","article-title":"Effect of voice disguise on the performance of a forensic automatic speaker recognition system","author":"ku?nzel","year":"2004","journal-title":"IEEE Odyssey Speaker and Language Recognition Workshop"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2007.05.019"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ODYSSEY.2006.248123"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02312-5_21"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2007.902877"},{"key":"22","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TPAMI.2011.104","article-title":"Probabilistic models for inference about identity","volume":"34","author":"li","year":"2012","journal-title":"Pattern Analysis and Machine Intelligence IEEE Transactions on"},{"key":"23","first-page":"249","article-title":"Analysis of ivector length normalization in speaker recognition systems","author":"garcia-romero","year":"2011","journal-title":"International Conference on Speech Communication and Technology"},{"key":"24","first-page":"1","article-title":"ALIZE\/SpkDet: A state-of-the-art open source software for speaker recognition","volume":"5","author":"bonastre","year":"2008","journal-title":"IEEE Odyssey Speaker and Language Recognition Workshop"},{"key":"25","article-title":"NIST'04 speaker recognition evaluation campaign: New LIA speaker detection platform based on ALIZE toolkit","author":"bonastre","year":"2004","journal-title":"NIST SRE'04"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712706"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ODYSSEY.2006.248128"},{"key":"28","first-page":"2053","article-title":"Artificial impostor voice transformation effects on false acceptance rates","author":"bonastre","year":"2007","journal-title":"Proc INTERSPEECH"},{"key":"29","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2012-465","article-title":"Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition","author":"wu","year":"2012","journal-title":"Proc 13th Interspeech"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2013-288","article-title":"Spoofing and countermeasures for automatic speaker verification","author":"evans","year":"2013","journal-title":"Proc of INTERSPEECH 2013"},{"journal-title":"EU FP7 Project-'TABULA RASA","year":"2010","key":"2"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-6524-8_7","article-title":"Speaker recognition anti-spoofing","author":"evans","year":"2014","journal-title":"Handbook of Biometric Anti-spoofing"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638222"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.21437\/Eurospeech.1999-313","article-title":"On the security of HMM-based speaker verification systems against imposture using synthetic speech","author":"masuko","year":"1999","journal-title":"Proc EUROSPEECH"},{"key":"6","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.21437\/Eurospeech.1999-310","article-title":"Vulnerability in speaker verification-a study of technical impostor techniques","volume":"3","author":"lindberg","year":"1999","journal-title":"Proceedings of the European Conference on Speech Communication and Technology"},{"key":"5","first-page":"145","article-title":"Vulnerability of speaker verification to voice mimicking","author":"lau","year":"2004","journal-title":"Intelligent Multimedia Video and Speech Processing 2004 Proceedings of 2004 International Symposium On IEEE"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.161"},{"key":"9","article-title":"On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals","author":"alegre","year":"2012","journal-title":"Proc 12th EUSIPCO"},{"key":"8","first-page":"37","article-title":"Effect of impostor speech transformation on automatic speaker recognition","author":"matrouf","year":"2005","journal-title":"Biometrics on the Internet"}],"event":{"name":"ICASSP 2014 - 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2014,5,4]]},"location":"Florence, Italy","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6844297\/6853544\/06853696.pdf?arnumber=6853696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T00:04:39Z","timestamp":1746317079000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6853696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icassp.2014.6853696","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}