{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:25:12Z","timestamp":1774365912043,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978296","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1080-1091","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":145,"title":["VoiceLive"],"prefix":"10.1145","author":[{"given":"Linghan","family":"Zhang","sequence":"first","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Sheng","family":"Tan","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android voice recognition. http:\/\/www.popsci.com\/new-android-can-recognize-your-voice.  Android voice recognition. http:\/\/www.popsci.com\/new-android-can-recognize-your-voice."},{"key":"e_1_3_2_1_2_1","unstructured":"Google smart lock. https:\/\/get.google.com\/smartlock\/.  Google smart lock. https:\/\/get.google.com\/smartlock\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Hsbc offers voice biometric. http:\/\/www.bbc.com\/news\/business-35609833.  Hsbc offers voice biometric. http:\/\/www.bbc.com\/news\/business-35609833."},{"key":"e_1_3_2_1_4_1","unstructured":"Mobile voice biometric security. http:\/\/voicevault.com\/hsbc-embraces-mobile-voice-biometric-security-technology\/.  Mobile voice biometric security. http:\/\/voicevault.com\/hsbc-embraces-mobile-voice-biometric-security-technology\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Saypay technologies. http:\/\/saypaytechnologies.com\/.  Saypay technologies. http:\/\/saypaytechnologies.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Vocalpassword. http:\/\/www.nuance.com\/ucmprod\/groups\/enterprise\/@web-enus\/documents\/collateral\/nc_015226.pdf.  Vocalpassword. http:\/\/www.nuance.com\/ucmprod\/groups\/enterprise\/@web-enus\/documents\/collateral\/nc_015226.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"Voicekey mobile applications. http:\/\/speechpro-usa.com\/product\/voice_authentication\/voicekey#tab2.  Voicekey mobile applications. http:\/\/speechpro-usa.com\/product\/voice_authentication\/voicekey#tab2."},{"key":"e_1_3_2_1_8_1","unstructured":"Wechat voiceprint. http:\/\/blog.wechat.com\/2015\/05\/21\/voiceprint-the-new-wechat-password\/.  Wechat voiceprint. http:\/\/blog.wechat.com\/2015\/05\/21\/voiceprint-the-new-wechat-password\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712706"},{"key":"e_1_3_2_1_10_1","volume-title":"May 14","author":"Aley-Raz A.","year":"2013","unstructured":"A. Aley-Raz , N. M. Krause , M. I. Salmon , and R. Y. Gazit . Device, system, and method of liveness detection utilizing voice biometrics , May 14 2013 . US Patent 8,442,824. A. Aley-Raz, N. M. Krause, M. I. Salmon, and R. Y. Gazit. Device, system, and method of liveness detection utilizing voice biometrics, May 14 2013. US Patent 8,442,824."},{"key":"e_1_3_2_1_11_1","author":"Amin T. B.","year":"2013","unstructured":"T. B. Amin , J. S. German , and P. Marziliano . Detecting voice disguise from speech variability: Analysis of three glottal and vocal tract measures. The Journal of the Acoustical Society of America , 2013 . T. B. Amin, J. S. German, and P. Marziliano. Detecting voice disguise from speech variability: Analysis of three glottal and vocal tract measures. The Journal of the Acoustical Society of America, 2013.","journal-title":"The Journal of the Acoustical Society of America"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSLP.2010.5684887"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. Image and Vision Computing","author":"Chetty G.","year":"2004","unstructured":"G. Chetty and M. Wagner . Automated lip feature extraction for liveness verification in audio-video authentication . Proc. Image and Vision Computing , 2004 . G. Chetty and M. Wagner. Automated lip feature extraction for liveness verification in audio-video authentication. Proc. Image and Vision Computing, 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/an.1995.36.2.40"},{"key":"e_1_3_2_1_16_1","volume-title":"Laukkanen. I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry. In INTERSPEECH","author":"Hautamaki R. G.","year":"2013","unstructured":"R. G. Hautamaki , T. Kinnunen , V. Hautamaki , T. Leino , and A.- M. Laukkanen. I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry. In INTERSPEECH , 2013 . R. G. Hautamaki, T. Kinnunen, V. Hautamaki, T. Leino, and A.-M. Laukkanen. I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry. In INTERSPEECH, 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"Biometrics: personal identification in networked society","author":"Jain A.","year":"2006","unstructured":"A. Jain , R. Bolle , and S. Pankanti . Biometrics: personal identification in networked society . Springer Science & Business Media , 2006 . A. Jain, R. Bolle, and S. Pankanti. Biometrics: personal identification in networked society. Springer Science & Business Media, 2006."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-984-2_11"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSLP.1996.607048"},{"key":"e_1_3_2_1_21_1","volume-title":"Digital Humanities Conference","author":"Kisler T.","year":"2012","unstructured":"T. Kisler , F. Schiel , and H. Sloetjes . Signal processing via web services: the use case webmaus . In Digital Humanities Conference , 2012 . T. Kisler, F. Schiel, and H. Sloetjes. Signal processing via web services: the use case webmaus. In Digital Humanities Conference, 2012."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1976.1162830"},{"key":"e_1_3_2_1_23_1","volume-title":"Hardcourt Brace Jovanovich Inc","author":"Ladefoged P.","year":"2014","unstructured":"P. Ladefoged . A course in phonetics. Hardcourt Brace Jovanovich Inc . NY , 2014 . P. Ladefoged. A course in phonetics. Hardcourt Brace Jovanovich Inc. NY, 2014."},{"key":"e_1_3_2_1_24_1","volume-title":"Eurospeech","author":"Lindberg J.","year":"1999","unstructured":"J. Lindberg , M. Blomberg , Vulnerability in speaker verification-a study of technical impostor techniques . In Eurospeech , 1999 . J. Lindberg, M. Blomberg, et al. Vulnerability in speaker verification-a study of technical impostor techniques. In Eurospeech, 1999."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790122"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"e_1_3_2_1_27_1","volume-title":"Acoustics of American English speech: a dynamic approach","author":"Olive J. P.","year":"1993","unstructured":"J. P. Olive , A. Greenwood , and J. Coleman . Acoustics of American English speech: a dynamic approach . Springer Science & Business Media , 1993 . J. P. Olive, A. Greenwood, and J. Coleman. Acoustics of American English speech: a dynamic approach. Springer Science & Business Media, 1993."},{"key":"e_1_3_2_1_28_1","first-page":"7","author":"Poss J. C.","year":"2008","unstructured":"J. C. Poss , D. Boye , and M. W. Mobley . Biometric voice authentication , June 10 2008 . US Patent 7 ,386,448. J. C. Poss, D. Boye, and M. W. Mobley. Biometric voice authentication, June 10 2008. US Patent 7,386,448.","journal-title":"Biometric voice authentication"},{"key":"e_1_3_2_1_29_1","volume-title":"DTIC Document","author":"Ravishankar M. K.","year":"1996","unstructured":"M. K. Ravishankar . Efficient algorithms for speech recognition. Technical report , DTIC Document , 1996 . M. K. Ravishankar. Efficient algorithms for speech recognition. Technical report, DTIC Document, 1996."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118584156"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495503"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987476.1987508"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2011.6016982"},{"key":"e_1_3_2_1_34_1","volume-title":"A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case","author":"Wu Z.","year":"2012","unstructured":"Z. Wu , T. Kinnunen , E. Chng , and H. Li . A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case . In IEEE APSIPA ASC , 2012 . Z. Wu, T. Kinnunen, E. Chng, and H. Li. A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case. In IEEE APSIPA ASC, 2012."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1687299.1687321"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:16Z","timestamp":1750222576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978296"}},"subtitle":["A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":35,"alternative-id":["10.1145\/2976749.2978296","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978296","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}