{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T10:37:24Z","timestamp":1753439844842},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/apsipa.2018.8659789","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T23:34:55Z","timestamp":1552347295000},"source":"Crossref","is-referenced-by-count":18,"title":["Instantaneous Phase and Excitation Source Features for Detection of Replay Attacks"],"prefix":"10.23919","author":[{"given":"Rohan Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Haizhou","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1121\/1.4921679"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2013.2273717"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1981.1163530"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2064307"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/89.365379"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2017.8282211"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1121\/1.4954653"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2015.7084846"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461501"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.1997.679118"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2015-462","article-title":"Asvspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge","author":"wu","year":"2015","journal-title":"Proceedings of Interspeech 2015"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6393(95)00010-L"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791200"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2","DOI":"10.21437\/Interspeech.2017-1111","article-title":"The asvspoof 2017 challenge: Assessing the limits of replay spoofing attack detection","author":"kinnunen","year":"2017","journal-title":"Proc Interspeech 2017"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.21437\/Odyssey.2018-42","article-title":"ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements","author":"delgado","year":"2018","journal-title":"Proc Odyssey 2018 The Speaker and Language Recognition Workshop"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.01.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2016-41"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2016.04.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2016.02.005"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1836","DOI":"10.21437\/Interspeech.2014-417","article-title":"Combining source and system information for limited data speaker verification","author":"das","year":"2014","journal-title":"Proc INTERSPEECH 2014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2760243"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"12","DOI":"10.21437\/Interspeech.2017-1362","article-title":"Novel variable length teager energy separation based instantaneous frequency features for replay detection","author":"patil","year":"2017","journal-title":"Proc Interspeech 2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-016-1148-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2014.6811345"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"22","DOI":"10.21437\/Interspeech.2017-930","article-title":"Spoof detection using source, instantaneous frequency and cepstral features","author":"jelil","year":"2017","journal-title":"Proc Interspeech 2017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"27","DOI":"10.21437\/Interspeech.2017-776","article-title":"Audio replay attack detection using high-frequency features","author":"witkowski","year":"2017","journal-title":"Proc Interspeech 2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3080-9"},{"key":"ref8","first-page":"925","article-title":"Spoofing and countermeasures for automatic speaker verification","author":"evans","year":"2013","journal-title":"14th Annual Conference of the International Speech Communication Association Interspeech 2013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref2","first-page":"3317","article-title":"Joint application of speech and speaker recognition for automation and security in smart home","author":"lee","year":"2011","journal-title":"InterSpeech"},{"key":"ref1","article-title":"Speaker verification makes its debut in smartphone","author":"lee","year":"2013","journal-title":"SLTC Newsletter"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2671435"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095943"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2011.6016982"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19530-3_25"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953187"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SPCOM.2016.7746646"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2010.5430209"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041636"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2692389"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"7","DOI":"10.21437\/Interspeech.2017-450","article-title":"Experimental analysis of features for replay attack detection results on the asvspoof 2017 challenge","author":"font","year":"2017","journal-title":"Proc Interspeech 2017"},{"key":"ref43","year":"0","journal-title":"Bosaris Toolkit"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.12.003"}],"event":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2018,11,12]]},"end":{"date-parts":[[2018,11,15]]}},"container-title":["2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648538\/8659446\/08659789.pdf?arnumber=8659789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T11:46:57Z","timestamp":1694692017000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8659789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":44,"URL":"https:\/\/doi.org\/10.23919\/apsipa.2018.8659789","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}