{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:05:06Z","timestamp":1760709906338,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/iscslp.2018.8706673","type":"proceedings-article","created":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T22:58:35Z","timestamp":1558393115000},"page":"185-189","source":"Crossref","is-referenced-by-count":11,"title":["Novel Amplitude Weighted Frequency Modulation Features for Replay Spoof Detection"],"prefix":"10.1109","author":[{"given":"Madhu R.","family":"Kamble","sequence":"first","affiliation":[]},{"given":"Hemant A.","family":"Patil","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Speech Processing &#x2013; A Dynamic and Optimization-Oriented Approach","year":"2003","author":"deng","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1121\/1.414997"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SSAP.1992.246837"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/0165-1684(94)90169-4","article-title":"A comparison of the energy operator and the Hilbert transform approach to signal and speech demodulation","volume":"37","author":"potamianos","year":"1994","journal-title":"Signal Processing"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref10","first-page":"1","article-title":"The ASVspoof 2017 Challenge: Assessing the limits of replay spoofing attack detection","author":"kinnunen","year":"2017","journal-title":"InterSpeech"},{"key":"ref11","first-page":"2996","article-title":"The RedDots data collection for speaker recognition","author":"lee","year":"2015","journal-title":"InterSpeech"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"7","DOI":"10.21437\/Interspeech.2017-450","article-title":"Experimental analysis of features for replay attack detection results on the ASVspoof 2017 challenge","author":"font","year":"2017","journal-title":"InterSpeech"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"12","DOI":"10.21437\/Interspeech.2017-1362","article-title":"Novel variable length Teager energy separation based instantaneous frequency features for replay detection","author":"patil","year":"2017","journal-title":"InterSpeech"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"22","DOI":"10.21437\/Interspeech.2017-930","article-title":"Spoof detection using source, instantaneous frequency and cepstral features","author":"jelil","year":"2017","journal-title":"InterSpeech"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"107","DOI":"10.21437\/Interspeech.2017-676","article-title":"SFF anti-spoofer: IIIT-H submission for automatic speaker verification spoofing and countermeasures Challenge 2017","author":"alluri","year":"2017","journal-title":"InterSpeech"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"27","DOI":"10.21437\/Interspeech.2017-776","article-title":"Audio replay attack detection using high-frequency features","author":"witkowski","year":"2017","journal-title":"InterSpeech"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"82","DOI":"10.21437\/Interspeech.2017-360","article-title":"Audio replay attack detection with deep learning frameworks","author":"lavrentyeva","year":"2017","journal-title":"InterSpeech"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"17","DOI":"10.21437\/Interspeech.2017-906","article-title":"Countermeasures for automatic speaker verification replay spoofing attack: On data augmentation, feature representation, classification and fusion","author":"cai","year":"2017","journal-title":"InterSpeech"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"102","DOI":"10.21437\/Interspeech.2017-1085","article-title":"ResNet and model fusion for automatic spoofing detection","author":"chen","year":"2017","journal-title":"Proc Interspeech 2017"},{"journal-title":"Discrete-Time Speech Signal Processing Principles and Practice","year":"2006","author":"quatieri","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953187"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1992.226135"},{"key":"ref3","first-page":"1","article-title":"Re-assessing the threat of replay spoofing attacks against automatic speaker verification","author":"alegre","year":"2014","journal-title":"IEEE International Conference of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1152\/jn.01256.2005"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"97","DOI":"10.21437\/Interspeech.2017-1377","article-title":"Replay attack detection using DNN for channel discrimination","author":"nagarsheth","year":"2017","journal-title":"InterSpeech"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791200"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPCOM.2016.7746646"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4960401"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041636"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1016\/j.specom.2009.04.004","article-title":"Statistical parametric speech synthesis","volume":"51","author":"zen","year":"2009","journal-title":"Speech Communication"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081178"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2015.2430815"},{"key":"ref21","first-page":"308","article-title":"Effectiveness of Mel scale-based ESA-IFCC features for classification of natural vs. spoofed speech","author":"kamble","year":"2017","journal-title":"Lecture Notes in Computer Science (LNCS)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1980.1163420"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1991.150366"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/78.212729"},{"journal-title":"A Wavelet Tour of Signal Processing","year":"1999","author":"mallat","key":"ref25"}],"event":{"name":"2018 11th International Symposium on Chinese Spoken Language Processing (ISCSLP)","start":{"date-parts":[[2018,11,26]]},"location":"Taipei City, Taiwan","end":{"date-parts":[[2018,11,29]]}},"container-title":["2018 11th International Symposium on Chinese Spoken Language Processing (ISCSLP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8701133\/8706262\/08706673.pdf?arnumber=8706673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:11:08Z","timestamp":1598224268000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8706673\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/iscslp.2018.8706673","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}