{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:09:07Z","timestamp":1777043347960,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133962","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"57-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":159,"title":["Hearing Your Voice is Not Enough"],"prefix":"10.1145","author":[{"given":"Linghan","family":"Zhang","sequence":"first","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Sheng","family":"Tan","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712706"},{"key":"e_1_3_2_2_2_1","volume-title":"2014 International Conference of the. IEEE, 1--6.","author":"Alegre Federico","year":"2014","unstructured":"Federico Alegre, Artur Janicki, and Nicholas Evans. 2014. Re-assessing the threat of replay spoofing attacks against automatic speaker verification Biometrics Special Interest Group (BIOSIG), 2014 International Conference of the. IEEE, 1--6."},{"key":"e_1_3_2_2_3_1","first-page":"442","article-title":"Device, system, and method of liveness detection utilizing voice biometrics. (May 14 2013)","volume":"8","author":"Aley-Raz Almog","year":"2013","unstructured":"Almog Aley-Raz, Nir Moshe Krause, Michael Itzhak Salmon, and Ran Yehoshua Gazit 2013. Device, system, and method of liveness detection utilizing voice biometrics. (May 14 2013). US Patent 8,442,824.","journal-title":"US Patent"},{"key":"e_1_3_2_2_4_1","volume-title":"Detecting voice disguise from speech variability: Analysis of three glottal and vocal tract measures. The Journal of the Acoustical Society of America","author":"Amin Talal B","year":"2013","unstructured":"Talal B Amin, James S German, and Pina Marziliano. 2013. Detecting voice disguise from speech variability: Analysis of three glottal and vocal tract measures. The Journal of the Acoustical Society of America (2013)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Si Chen Kui Ren Sixu Piao Cong Wang Qian Wang Jian Weng Lu Su and Aziz Mohaisen 2017. You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones. (2017).","DOI":"10.1109\/ICDCS.2017.133"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2015.05.002"},{"key":"e_1_3_2_2_8_1","volume-title":"Anne-Maria Laukkanen. 2013 I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry.. In INTERSPEECH.","author":"Hautam\u00e4ki Rosa Gonz\u00e1lez","unstructured":"Rosa Gonz\u00e1lez Hautam\u00e4ki, Tomi Kinnunen, Ville Hautam\u00e4ki, Timo Leino, and Anne-Maria Laukkanen. 2013 I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry.. In INTERSPEECH."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1499"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.406887"},{"key":"e_1_3_2_2_11_1","volume-title":"mbox","author":"Tomi Kinnunen","year":"2012","unstructured":"Tomi Kinnunen et almbox. 2012. Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech. In IEEE ICASSP."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Tomi Kinnunen Md Sahidullah H\u00e9ctor Delgado Massimiliano Todisco Nicholas Evans Junichi Yamagishi and Kong Aik Lee. 2017. The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection. (2017).","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Andreas Kipp Maria-Barbara Wesenick and Florian Schiel 1996. Automatic detection and segmentation of pronunciation variants in German speech corpora IEEE ICSLP.","DOI":"10.21437\/ICSLP.1996-27"},{"key":"e_1_3_2_2_14_1","unstructured":"Thomas Kisler Florian Schiel and Han Sloetjes. 2012. Signal processing via web services: the use case WebMAUS Digital Humanities Conference."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.413468"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Zvi Kons and Hagai Aronowitz 2013. Voice transformation-based spoofing of text-dependent speaker verification systems. INTERSPEECH.","DOI":"10.21437\/Interspeech.2013-292"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.413374"},{"key":"e_1_3_2_2_18_1","volume-title":"A course in phonetics","author":"Ladefoged P","unstructured":"P Ladefoged. 2014. A course in phonetics. Hardcourt Brace Jovanovich Inc. NY."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2012.08.001"},{"key":"e_1_3_2_2_20_1","volume-title":"et almbox","author":"Lawson Eleanor","year":"2015","unstructured":"Eleanor Lawson, Jane Stuart-Smith, James M Scobbie, Satsuki Nakai, David Beavan, Fiona Edmonds, Iain Edmonds, Alice Turk, Claire Timmins, J Beck, et almbox. 2015. Dynamic Dialects: an articulatory web resource for the study of accents. (2015)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2016.7820863"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Jian Liu Yan Wang Gorkem Kar Yingying Chen Jie Yang and Marco Gruteser. 2015. Snooping keystrokes with mm-level audio ranging on a single phone ACM MobiCom.","DOI":"10.1145\/2789168.2790122"},{"key":"e_1_3_2_2_23_1","volume-title":"mbox","author":"Meyers Robert Allen","year":"1987","unstructured":"Robert Allen Meyers et almbox. 1987. Encyclopedia of physical science and technology. Academic Press."},{"key":"e_1_3_2_2_24_1","volume-title":"Acoustics of American English speech: a dynamic approach","author":"Olive Joseph P","unstructured":"Joseph P Olive, Alice Greenwood, and John Coleman. 1993. Acoustics of American English speech: a dynamic approach. Springer Science & Business Media."},{"key":"e_1_3_2_2_25_1","volume-title":"Symposium On Usable Privacy and Security (SOUPS","author":"Panjwani Saurabh","year":"2014","unstructured":"Saurabh Panjwani and Achintya Prakash 2014. Crowdsourcing attacks on biometric systems. In Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, 257--269."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.923297"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-37"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.1356020"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407362"},{"key":"e_1_3_2_2_31_1","first-page":"120","volume-title":"Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features International Conference on Computer Recognition Systems. Springer","author":"Smiatacz Maciej","year":"2017","unstructured":"Maciej Smiatacz. 2017. Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features International Conference on Computer Recognition Systems. Springer,pages 120--129."},{"key":"e_1_3_2_2_32_1","volume-title":"Front-End for Anti-Spoofing Countermeasures in Speaker Verification: Scattering Spectral Decomposition","author":"Sriskandaraja Kaavya","year":"2016","unstructured":"Kaavya Sriskandaraja, Vidhyasaharan Sethu, Eliathamby Ambikairajah, and Haizhou Li. 2016. Front-End for Anti-Spoofing Countermeasures in Speaker Verification: Scattering Spectral Decomposition. IEEE Journal of Selected Topics in Signal Processing (2016)."},{"key":"e_1_3_2_2_33_1","volume-title":"2016 IEEE Second International Conference on. IEEE, 385--389","author":"Wang Chun","year":"2016","unstructured":"Chun Wang, Yuexian Zou, Shihan Liu, Wei Shi, and Weiqiao Zheng 2016. An Efficient Learning Based Smartphone Playback Attack Detection Using GMM Supervector Multimedia Big Data (BigMM), 2016 IEEE Second International Conference on. IEEE, 385--389."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Zhi-Feng Wang Gang Wei and Qian-Hua He 2011. Channel pattern noise based playback attack detection algorithm for speaker recognition IEEE ICMLC.","DOI":"10.1109\/ICMLC.2011.6016982"},{"key":"e_1_3_2_2_35_1","volume-title":"Guidelines for the use of multimedia in instruction Proceedings of the Human Factors and Ergonomics Society Annual Meeting","author":"Williams James R","unstructured":"James R Williams. 1998. Guidelines for the use of multimedia in instruction Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. Vol. 42. SAGEPublications Sage CA: Los Angeles, CA, 1447--1451."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"e_1_3_2_2_37_1","volume-title":"2014 Annual Summit and Conference (APSIPA). IEEE, 1--5.","author":"Wu Zhizheng","year":"2014","unstructured":"Zhizheng Wu, Sheng Gao, Eng Siong Cling, and Haizhou Li. 2014. A study on replay attack and anti-spoofing fortext-dependent speaker verification Asia-Pacific Signal and Information Processing Association, 2014 Annual Summit and Conference (APSIPA). IEEE, 1--5."},{"key":"e_1_3_2_2_38_1","unstructured":"Zhizheng Wu T Kinnunen ES Chng and H Li. 2012. A study on spoofing attack in state-of-the-artspeaker verification: the telephone speech case IEEE APSIPA ASC."},{"key":"e_1_3_2_2_39_1","first-page":"3750","article-title":"ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge","volume":"10","author":"Wu Zhizheng","year":"2015","unstructured":"Zhizheng Wu, Tomi Kinnunen, Nicholas Evans, Junichi Yamagishi, Cemal Hanilcci, Md Sahidullah, and Aleksandr Sizov. 2015. ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge. Training, Vol. 10, 15 (2015), 3750.","journal-title":"Training"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3080-9"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Jie Yang Yingying Chen and Wade Trappe 2009. Detecting spoofing attacks in mobile wireless environments SECON.","DOI":"10.1109\/SAHCN.2009.5168926"},{"key":"e_1_3_2_2_42_1","volume-title":"Biometric solutions: For authentication in an e-world","author":"Zhang David D","unstructured":"David D Zhang. 2012. Biometric solutions: For authentication in an e-world. Vol. Vol. 697. Springer Science & Business Media."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133962","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133962"}},"subtitle":["An Articulatory Gesture Based Liveness Detection for Voice Authentication"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":42,"alternative-id":["10.1145\/3133956.3133962","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133962","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}