{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:37:37Z","timestamp":1730342257191,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/apsipa.2018.8659510","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T23:11:49Z","timestamp":1552950709000},"page":"1038-1046","source":"Crossref","is-referenced-by-count":5,"title":["Use of Claimed Speaker Models for Replay Detection"],"prefix":"10.23919","author":[{"given":"Gajan","family":"Suthokumar","sequence":"first","affiliation":[]},{"given":"Kaavya","family":"Sriskandaraja","sequence":"additional","affiliation":[]},{"given":"Vidhyasaharan","family":"Sethu","sequence":"additional","affiliation":[]},{"given":"Chamith","family":"Wijenayake","sequence":"additional","affiliation":[]},{"given":"Eliathamby","family":"Ambikairajah","sequence":"additional","affiliation":[]},{"given":"Haizhou","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639125"},{"key":"ref10","first-page":"1","article-title":"On the Vulnerability of Speaker Verification to Realistic Voice Spoofing","author":"erg\u00fcnay","year":"2015","journal-title":"IEEE International Conference on Biometrics Theory Applications and Systems"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2","DOI":"10.21437\/Interspeech.2017-1111","article-title":"The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection","author":"kinnunen","year":"2017","journal-title":"InterSpeech"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2743340"},{"journal-title":"Spoof Detection Using Source Instantaneous Frequency and Cepstral Features","year":"2017","author":"jelil","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"82","DOI":"10.21437\/Interspeech.2017-360","article-title":"Audio replay attack detection with deep learning frameworks","author":"lavrentyeva","year":"2017","journal-title":"InterSpeech"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"102","DOI":"10.21437\/Interspeech.2017-1085","article-title":"ResNet and model fusion for automatic spoofing detection","author":"chen","year":"2017","journal-title":"Proceedings of the Annual Conference of the International Speech Communication Association INTERSPEECH 2017"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"97","DOI":"10.21437\/Interspeech.2017-1377","article-title":"Replay attack detection using DNN for channel discrimination","author":"nagarsheth","year":"2017","journal-title":"InterSpeech"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"7","DOI":"10.21437\/Interspeech.2017-450","article-title":"Experimental analysis of features for replay attack detection-Results on the ASVspoof 2017 Challenge","author":"font","year":"2017","journal-title":"InterSpeech"},{"key":"ref18","first-page":"296","article-title":"ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements","author":"todisco","year":"2018","journal-title":"Odyssey"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-256"},{"key":"ref28","first-page":"2087","article-title":"A comparison of features for synthetic speech detection","volume":"2015?janua","author":"sahidullah","year":"2015","journal-title":"InterSpeech"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1121\/1.400476"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"ref6","first-page":"61","article-title":"Introducing I-vectors for joint anti-spoofing and speaker verification","author":"khoury","year":"2014","journal-title":"InterSpeech"},{"journal-title":"Information Theory and Statistics","year":"1968","author":"kullback","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407362"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1758"},{"key":"ref2","first-page":"1211","article-title":"Vulnerability In Speaker Verification - A Study Of Technical Impostor Techniques","volume":"3","author":"lindberg","year":"2001","journal-title":"Proc EUROSPEECH"},{"key":"ref9","first-page":"1","article-title":"ASVspoof 2015: Automatic Speaker Verification Spoofing and Countermeasures Challenge Evaluation Plan","author":"wu","year":"2015","journal-title":"Proc Annu Conf Int Speech Commun Assoc"},{"key":"ref1","first-page":"145","article-title":"Vulnerability of speaker verification to voice mimicking","author":"lau","year":"2004","journal-title":"Proc 2004 Int Symp Intelligent Multimedia Video Speech Processing"},{"key":"ref20","first-page":"27","article-title":"Audio replay attack detection using high-frequency features","author":"witkowski","year":"2017","journal-title":"Proceedings of the Conference of the International Speech Communication Association-Interspeech"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"12","DOI":"10.21437\/Interspeech.2017-1362","article-title":"Novel variable length teager energy separation based instantaneous frequency features for replay detection","author":"patil","year":"2017","journal-title":"Proceedings of the Annual Conference of the International Speech Communication Association INTERSPEECH 2017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2017.8282211"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953187"},{"key":"ref23","first-page":"2996","article-title":"The RedDots Data Collection for Speaker Recognition","author":"lee","year":"2015","journal-title":"InterSpeech"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1846"}],"event":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2018,11,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2018,11,15]]}},"container-title":["2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648538\/8659446\/08659510.pdf?arnumber=8659510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:19:13Z","timestamp":1598221153000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8659510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/apsipa.2018.8659510","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}