{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:25:56Z","timestamp":1743063956054},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.23919\/eusipco.2017.8081176","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T21:20:38Z","timestamp":1509657638000},"page":"96-100","source":"Crossref","is-referenced-by-count":5,"title":["Speaker verification anti-spoofing using linear prediction residual phase features"],"prefix":"10.23919","author":[{"given":"Cemal","family":"Hanilci","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3080-9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref12","first-page":"2037","article-title":"ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge","author":"wu","year":"2015","journal-title":"Proc INTERSPEECH"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472724"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.21437\/Interspeech.2012-465","article-title":"Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition","author":"wu","year":"2012","journal-title":"Proc INTERSPEECH"},{"key":"ref15","first-page":"2052","article-title":"Spoofing speech detection using high dimensional magnitude and phase features: the NTU approach for ASVspoof 2015 challenge","author":"xiao","year":"2015","journal-title":"Proc INTERSPEECH"},{"key":"ref16","first-page":"2077","article-title":"Spoofing countermeasure based on analysis of linear prediction error","author":"janicki","year":"2015","journal-title":"Proc INTERSPEECH"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/89.365379"},{"key":"ref18","first-page":"2057","article-title":"Classifiers for synthetic speech detection: A comparison","author":"hanil\u00e7i","year":"2015","journal-title":"Proc INTERSPEECH"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9792"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSLP.2010.5684887"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref6","first-page":"28","article-title":"Evaluation of the vulnerability of speaker verification to synthetic speech","author":"leon","year":"2010","journal-title":"Proc Odyssey 2010 The Speaker and Language Recognition Workshop"},{"key":"ref5","first-page":"1798","article-title":"Revisiting the security of speaker verification systems against imposture using synthetic speech","author":"leon","year":"2010","journal-title":"Proc IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2015.05.002"},{"key":"ref7","first-page":"36","article-title":"On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals","author":"alegre","year":"2012","journal-title":"Proc European Signal Processing Conference EUSIPCO"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.08.009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1499"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2005.860538"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2016.06.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-010-9087-8"}],"event":{"name":"2017 25th European Signal Processing Conference (EUSIPCO)","start":{"date-parts":[[2017,8,28]]},"location":"Kos, Greece","end":{"date-parts":[[2017,9,2]]}},"container-title":["2017 25th European Signal Processing Conference (EUSIPCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8067434\/8081145\/08081176.pdf?arnumber=8081176","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,6]],"date-time":"2022-08-06T05:41:43Z","timestamp":1659764503000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8081176\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/eusipco.2017.8081176","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}