{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:29:40Z","timestamp":1776889780033,"version":"3.51.2"},"reference-count":53,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/apsipa.2018.8659666","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T23:11:49Z","timestamp":1552950709000},"page":"1047-1053","source":"Crossref","is-referenced-by-count":36,"title":["A Survey on Replay Attack Detection for Automatic Speaker Verification (ASV) System"],"prefix":"10.23919","author":[{"given":"Hemant A.","family":"Patil","sequence":"first","affiliation":[]},{"given":"Madhu R.","family":"Kamble","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"107","article-title":"SFF anti-spoofer: IIIT-H submission for automatic speaker verification spoofing and countermeasures challenge 2017","author":"alluri","year":"2017","journal-title":"INTER-SPEECH"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"97","DOI":"10.21437\/Interspeech.2017-1377","article-title":"Replay attack detection using DNN for channel discrimination","author":"nagarsheth","year":"2017","journal-title":"InterSpeech"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"312","DOI":"10.21437\/Odyssey.2018-44","article-title":"t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification","author":"kinnunen","year":"2018","journal-title":"Odyssey The Speaker and Language Recognition Workshop"},{"key":"ref32","first-page":"1895","article-title":"The DET curve in assessment of decision task performance","author":"martin","year":"1997","journal-title":"Proc of European Conference of Speech Communication and Technology"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"296","DOI":"10.21437\/Odyssey.2018-42","article-title":"ASVspoof 2017 version 2.0: meta-data analysis and baseline enhancements","author":"delgado","year":"2018","journal-title":"Proc Odyssey 2018 The Speaker and Language Recognition Workshop"},{"key":"ref30","first-page":"2996","article-title":"The RedDots data collection for speaker recognition","author":"lee","year":"2015","journal-title":"InterSpeech"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"12","DOI":"10.21437\/Interspeech.2017-1362","article-title":"Novel variable length Teager energy separation based instantaneous frequency features for replay detection","author":"patil","year":"2017","journal-title":"InterSpeech"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"102","DOI":"10.21437\/Interspeech.2017-1085","article-title":"ResNet and model fusion for automatic spoofing detection","author":"chen","year":"2017","journal-title":"InterSpeech"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"7","DOI":"10.21437\/Interspeech.2017-450","article-title":"Experimental analysis of features for replay attack detection results on the ASVspoof 2017 challenge","author":"font","year":"2017","journal-title":"InterSpeech"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2692389"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791200"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG.2016.7736933"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2697179"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(13)70128-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19530-3_25"},{"key":"ref22","first-page":"2037","article-title":"ASVspoof 2015: The first automatic speaker verification spoofing and countermeasures challenge","author":"wu","year":"2015","journal-title":"InterSpeech"},{"key":"ref21","first-page":"1","article-title":"The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection","author":"kinnunen","year":"2017","journal-title":"InterSpeech"},{"key":"ref24","author":"quatieri","year":"2006","journal-title":"Discrete-Time Speech Signal Processing Principles and Practice"},{"key":"ref23","author":"kinnunen","year":"2017","journal-title":"Asvspoof 2017 Automatic speaker verification spoofing and countermeasures challenge evaluation plan"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953187"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2017.8308602"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1702"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-2279"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2016.2526653"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/89.905997"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4960401"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"27","DOI":"10.21437\/Interspeech.2017-776","article-title":"Audio replay attack detection using high-frequency features","author":"witkowski","year":"2017","journal-title":"InterSpeech"},{"key":"ref12","article-title":"Voice anti-spoofing","author":"evans","year":"2014","journal-title":"Handbook of biometric antispoofing"},{"key":"ref13","first-page":"940","article-title":"A new speaker verification spoofing countermeasure based on local binary patterns","author":"alegre","year":"2013","journal-title":"InterSpeech"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041636"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3080-9"},{"key":"ref16","first-page":"145","article-title":"Vulnerability of speaker verification to voice mimicking","author":"lau","year":"2004","journal-title":"IEEE International Symposium on Intelligent Multimedia Video and Speech Processing"},{"key":"ref17","first-page":"930","article-title":"I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry","author":"hautamaki","year":"2013","journal-title":"InterSpeech"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/PROC.1976.10156","article-title":"automatic speaker verification: a review","volume":"64","author":"rosenberg","year":"1976","journal-title":"Proceedings of the IEEE"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2381273"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref6","first-page":"1","article-title":"On the vulnerability of speaker verification to realistic voice spoofing","author":"erg\u00fcnay","year":"2015","journal-title":"IEEE International Conference on Biometrics Theory Applications and Systems (BTAS)"},{"key":"ref5","article-title":"Inside risks: the uses and abuses of biometrics","volume":"42","author":"bruce","year":"1999","journal-title":"Communications of the ACM"},{"key":"ref8","first-page":"289","article-title":"International organization for standardization","volume":"41","author":"koppell","year":"2011","journal-title":"Handb Transnatl Gov Inst Innov"},{"key":"ref7","first-page":"925","article-title":"Spoofing and countermeasures for automatic speaker verification","author":"evans","year":"2013","journal-title":"InterSpeech"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1661"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.04.004"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2017.8282211"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"17","DOI":"10.21437\/Interspeech.2017-906","article-title":"Countermeasures for automatic speaker verification replay spoofing attack: On data augmentation, feature representation, classification and fusion","author":"cai","year":"2017","journal-title":"InterSpeech"},{"key":"ref48","first-page":"1","article-title":"Relative phase shift features for replay spoof detection system","author":"srinivas","year":"2018","journal-title":"SLTU"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1651"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"82","DOI":"10.21437\/Interspeech.2017-360","article-title":"Audio replay attack detection with deep learning frameworks","author":"lavrentyeva","year":"2017","journal-title":"InterSpeech"},{"key":"ref41","first-page":"22","article-title":"Spoof detection using source, instantaneous frequency and cepstral features","author":"jelil","year":"2017","journal-title":"INTER-SPEECH"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1687"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1675"}],"event":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2018,11,12]]},"end":{"date-parts":[[2018,11,15]]}},"container-title":["2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648538\/8659446\/08659666.pdf?arnumber=8659666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T01:14:40Z","timestamp":1598231680000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8659666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":53,"URL":"https:\/\/doi.org\/10.23919\/apsipa.2018.8659666","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}