{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T23:20:49Z","timestamp":1698103249602},"reference-count":13,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,2,1]]},"DOI":"10.1587\/transinf.2019edl8115","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T22:09:45Z","timestamp":1580508585000},"page":"464-468","source":"Crossref","is-referenced-by-count":3,"title":["Constant-Q Deep Coefficients for Playback Attack Detection"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Jichen","family":"YANG","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, National University of Singapore"}]},{"given":"Longting","family":"XU","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Donghua University"}]},{"given":"Bo","family":"REN","sequence":"additional","affiliation":[{"name":"Microsoft Search Technology Center Asia"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] M. Shannon, H. Zen, and W. Byrne, \u201cAutoregressive models for statical parametric speech synthesis,\u201d IEEE Trans. Audio, Speech, Language Process., vol.21, no.3, pp.587-597, 2013. 10.1109\/tasl.2012.2227740","DOI":"10.1109\/TASL.2012.2227740"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] X. Tian, S.W. Lee, Z. Wu, E.S. Chng, and H. Li, \u201cAn example-based approach to frequency warping for voice conversation,\u201d IEEE\/ACM Trans. Audio, Speech, Language Process., vol.25, no.10, pp.1863-1876, 2017. 10.1109\/taslp.2017.2723721","DOI":"10.1109\/TASLP.2017.2723721"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] T. Kinnunen, M. Sahidullah, H. Delgado, M. Todisco, N. Evans, J. Yamagishi, and K.A. Lee, \u201cThe ASVspoof 2017 challenge: assessing the limits of replay spoofing attack detection,\u201d Annual Conference of the International Speech Communication Association (INTERSPEECH), pp.2-6, 2017. 10.21437\/interspeech.2017-1111","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] M. Todisco, H. Delgado, and N. Evans, \u201cA new feature for automatic speaker verification anti-spoofing: constant Q cepstral coefficients,\u201d Speaker and Language Recognition Workshop (ODYSSEY), pp.283-290, 2016. 10.21437\/odyssey.2016-41","DOI":"10.21437\/Odyssey.2016-41"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] M. Kamble and H.A. Patil, \u201cNovel variable length energy separation algorithm using instantaneous amplitude features for replay detection,\u201d 19th Annual Conference of the International Speech Communication Association (INTERSPEECH), pp.646-650, 2018. 10.21437\/interspeech.2018-1687","DOI":"10.21437\/Interspeech.2018-1687"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] J. Yang, R.K. Das, and H. Li, \u201cExtended constant-Q cepstral coefficients for detection of spoofing attacks,\u201d Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp.1024-1029, 2018. 10.23919\/apsipa.2018.8659537","DOI":"10.23919\/APSIPA.2018.8659537"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] F. Seide, G. Li, X. Chen, and D. Yu, \u201cFeature engineering in context-dependent deep neural networks for conversational speech transcription,\u201d IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU), pp.24-29, 2011. 10.1109\/asru.2011.6163899","DOI":"10.1109\/ASRU.2011.6163899"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] H. Delgado, M. Todisco, M. Sahidullah, N. Evans, T. Kinnunen, K.A. Lee, and J. Yamagishi, \u201cASVspoof 2017 version 2.0: meta-data analysis and baseline enhancements,\u201d Speaker and Language Recognition Workshop (ODYSSEY), pp.296-303, 2018. 10.21437\/odyssey.2018-42","DOI":"10.21437\/Odyssey.2018-42"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] J. Yang and L. Liu, \u201cPlayback speech detection based on magnitude-phase spectrum,\u201d Electronics Letters, vol.54, no.14, pp.901-903, 2018. 10.1049\/el.2018.0739","DOI":"10.1049\/el.2018.0739"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] F. Seide and A. Agarwal, \u201cCNTK: Microsoft&apos;s open-source deep learning toolkit,\u201d Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.2135-2135, 2016. 10.1145\/2939672.2945397","DOI":"10.1145\/2939672.2945397"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] M.J. Alam, G. Bhattacharya, and P. Kenny, \u201cBoosting the performance of spoofing detection systems of replay attacks using Q-logarithm domain feature normalization,\u201d Speaker and Language Recognition Workshop (ODYSSEY), pp.393-398, 2018. 10.21437\/odyssey.2018-55","DOI":"10.21437\/Odyssey.2018-55"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] J. Yang, C. You, and Q. He, \u201cFeature with complementarity of statistics and principal information for spoofing detection,\u201d 19th Annual Conference of the International Speech Communication Association (INTERSPEECH), pp.651-655, 2018. 10.21437\/interspeech.2018-1693","DOI":"10.21437\/Interspeech.2018-1693"},{"key":"13","unstructured":"[13] S.M. S. and H. Murthy, \u201cDecision-level feature switching as a paradigm for replay attack detection,\u201d 19th Annual Conference of the International Speech Communication Association (INTERSPEECH), pp.686-690, 2018. 10.21437\/interspeech.2018-1494"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019EDL8115\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T03:26:42Z","timestamp":1580527602000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019EDL8115\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,1]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edl8115","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,1]]}}}