{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T21:06:00Z","timestamp":1762808760319,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/spcom.2018.8724469","type":"proceedings-article","created":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T18:48:36Z","timestamp":1559242116000},"page":"332-336","source":"Crossref","is-referenced-by-count":12,"title":["Replay Attack Detection in Speaker Verification Using non-voiced segments and Decision Level Feature Switching"],"prefix":"10.1109","author":[{"given":"M. S.","family":"Saranya","sequence":"first","affiliation":[]},{"given":"R.","family":"Padmanabhan","sequence":"additional","affiliation":[]},{"given":"Hema A.","family":"Murthy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Focal multi-class: Toolkit for evaluation, fusion and calibration of multi-class recognition scores","author":"brummer","year":"2007","journal-title":"MINT Tutorial and User Manual"},{"key":"ref32","first-page":"120","author":"mekyska","year":"2011","journal-title":"Score Fusion in Text-Dependent Speaker Recognition Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/89.326623"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1117\/3.633187"},{"journal-title":"The BOSARIS toolkit Theory algorithms and code for surviving the new DCF","year":"2013","author":"br\u00fcmmer","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041636"},{"key":"ref11","first-page":"1678","article-title":"Score normalization in playback attack detection","author":"shang","year":"2010","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095943"},{"key":"ref13","first-page":"274","article-title":"Detecting replay attacks from far-field recordings on speaker verification systems","author":"villalba","year":"2011","journal-title":"Proceedings of the COST 2101 European conference on Biometrics and ID management"},{"key":"ref14","first-page":"699","article-title":"Prevention of impostors entering speaker recognition systems","volume":"48","author":"zhang","year":"2008","journal-title":"Journal of Tsinghua University (Science and Technology)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2003.10.002"},{"key":"ref16","first-page":"1125","article-title":"Feature switching in the i-vector framework for speaker verification","author":"asha","year":"2014","journal-title":"InterSpeech"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.specom.2017.08.004","article-title":"Feature-switching: Dynamic feature selection for an i-vector based speaker verification system","volume":"93","author":"saranya","year":"2017","journal-title":"Speech Communication"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-41"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/89.784108"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2011.5734713"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"27","DOI":"10.21437\/Interspeech.2017-776","article-title":"Audio Replay Attack Detection Using High-Frequency Features","author":"witkowski","year":"2017","journal-title":"InterSpeech"},{"journal-title":"Automatic speaker verification spoofing and countermeasures challenge (asvspoof 2015) database","year":"2015","author":"wu","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041636"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1377"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2011.5734713"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-676"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"12","DOI":"10.21437\/Interspeech.2017-1362","article-title":"Novel Variable Length Teager Energy Separation Based Instantaneous Frequency Features for Replay Detection","author":"patil","year":"2017","journal-title":"InterSpeech"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"7","DOI":"10.21437\/Interspeech.2017-450","article-title":"Experimental analysis of features for replay attack detection&#x2013;Results on the ASVspoof 2017 Challenge","author":"font","year":"2017","journal-title":"InterSpeech"},{"journal-title":"Automatic speaker verification spoofing and countermeasures challenge (asvspoof 2015) database","year":"2017","author":"kinnunen","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-360"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref20","first-page":"2996","article-title":"The reddots data collection for speaker recognition","author":"lee","year":"2015","journal-title":"InterSpeech"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2678684"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3080-9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/89.848229"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/97.995824"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.860538"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/1687-4722-2013-21"}],"event":{"name":"2018 International Conference on Signal Processing and Communications (SPCOM)","start":{"date-parts":[[2018,7,16]]},"location":"Bangalore, India","end":{"date-parts":[[2018,7,19]]}},"container-title":["2018 International Conference on Signal Processing and Communications (SPCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8718087\/8724385\/08724469.pdf?arnumber=8724469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T14:44:05Z","timestamp":1561473845000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8724469\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/spcom.2018.8724469","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}