Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification
•Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable spectro-temporal resolution key to detection performance.•State-of-the-art performance across three standard databases.•Cross-database resul...
Saved in:
Published in | Computer speech & language Vol. 45; pp. 516 - 535 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.09.2017
|
Subjects | |
Online Access | Get full text |
ISSN | 0885-2308 1095-8363 |
DOI | 10.1016/j.csl.2017.01.001 |
Cover
Loading…
Abstract | •Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable spectro-temporal resolution key to detection performance.•State-of-the-art performance across three standard databases.•Cross-database results point towards new approach for generalisation.
Recent evaluations such as ASVspoof 2015 and the similarly-named AVspoof have stimulated a great deal of progress to develop spoofing countermeasures for automatic speaker verification. This paper reports an approach which combines speech signal analysis using the constant Q transform with traditional cepstral processing. The resulting constant Q cepstral coefficients (CQCCs) were introduced recently and have proven to be an effective spoofing countermeasure. An extension of previous work, the paper reports an assessment of CQCCs generalisation across three different databases and shows that they deliver state-of-the-art performance in each case. The benefit of CQCC features stems from a variable spectro-temporal resolution which, while being fundamentally different to that used by most automatic speaker verification system front-ends, also captures reliably the tell-tale signs of manipulation artefacts which are indicative of spoofing attacks. The second contribution relates to a cross-database evaluation. Results show that CQCC configuration is sensitive to the general form of spoofing attack and use case scenario. This finding suggests that the past single-system pursuit of generalised spoofing detection may need rethinking. |
---|---|
AbstractList | •Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable spectro-temporal resolution key to detection performance.•State-of-the-art performance across three standard databases.•Cross-database results point towards new approach for generalisation.
Recent evaluations such as ASVspoof 2015 and the similarly-named AVspoof have stimulated a great deal of progress to develop spoofing countermeasures for automatic speaker verification. This paper reports an approach which combines speech signal analysis using the constant Q transform with traditional cepstral processing. The resulting constant Q cepstral coefficients (CQCCs) were introduced recently and have proven to be an effective spoofing countermeasure. An extension of previous work, the paper reports an assessment of CQCCs generalisation across three different databases and shows that they deliver state-of-the-art performance in each case. The benefit of CQCC features stems from a variable spectro-temporal resolution which, while being fundamentally different to that used by most automatic speaker verification system front-ends, also captures reliably the tell-tale signs of manipulation artefacts which are indicative of spoofing attacks. The second contribution relates to a cross-database evaluation. Results show that CQCC configuration is sensitive to the general form of spoofing attack and use case scenario. This finding suggests that the past single-system pursuit of generalised spoofing detection may need rethinking. |
Author | Todisco, Massimiliano Evans, Nicholas Delgado, Héctor |
Author_xml | – sequence: 1 givenname: Massimiliano surname: Todisco fullname: Todisco, Massimiliano email: todisco@eurecom.fr – sequence: 2 givenname: Héctor surname: Delgado fullname: Delgado, Héctor – sequence: 3 givenname: Nicholas surname: Evans fullname: Evans, Nicholas |
BookMark | eNp9kMtKQzEQhoNUsK0-gLu8wDlOzi2nuirFGxRE0K0hTSaSepqUJC349qbWlYuuBmbmG-b_JmTkvENCrhmUDFh3sy5VHMoKGC-BlQDsjIwZzNqir7t6RMbQ921R1dBfkEmMawDo2oaPycfCu5ikS_SVKtzGFORAlUdjrLLoUrylcxq33hvrPvNg5xKGDcq4C0iND1Tukt_IZFXeQvmFge4x2EznnneX5NzIIeLVX52S94f7t8VTsXx5fF7Ml4VqoEuFrpB3faUMcAMtrGbAZ8ZIrZDpjtUSwYDWsqpU3XHeGKlkU7WskbBS2tSmnhJ-vKuCjzGgEcqm3w9yIDsIBuKgSaxF1iQOmgQwkTVlkv0jt8FuZPg-ydwdGcyR9haDiAdZCrUNqJLQ3p6gfwDS8YVm |
CitedBy_id | crossref_primary_10_1016_j_specom_2023_102973 crossref_primary_10_1016_j_apacoust_2021_108283 crossref_primary_10_1016_j_specom_2020_10_003 crossref_primary_10_1016_j_csl_2020_101115 crossref_primary_10_1016_j_csl_2020_101114 crossref_primary_10_3390_app9081539 crossref_primary_10_1109_ACCESS_2023_3275790 crossref_primary_10_1016_j_compeleceng_2024_109355 crossref_primary_10_1016_j_csl_2023_101599 crossref_primary_10_1109_TASLP_2020_3036777 crossref_primary_10_1109_TASLP_2023_3288416 crossref_primary_10_1016_j_csl_2017_12_001 crossref_primary_10_1109_TIFS_2024_3431888 crossref_primary_10_1109_LSP_2023_3262419 crossref_primary_10_1016_j_jksuci_2022_02_024 crossref_primary_10_1109_TASLP_2022_3233236 crossref_primary_10_1016_j_eswa_2022_116597 crossref_primary_10_1007_s10462_023_10539_8 crossref_primary_10_1109_TASLP_2023_3306711 crossref_primary_10_1007_s10772_018_9534_5 crossref_primary_10_1109_ACCESS_2023_3332561 crossref_primary_10_1002_eng2_70087 crossref_primary_10_1109_TASLP_2019_2946897 crossref_primary_10_1109_ACCESS_2019_2960369 crossref_primary_10_1016_j_csl_2017_10_001 crossref_primary_10_1016_j_apacoust_2024_110221 crossref_primary_10_1007_s12652_023_04684_9 crossref_primary_10_1109_ACCESS_2019_2923806 crossref_primary_10_1145_3659607 crossref_primary_10_3390_s23115196 crossref_primary_10_1016_j_dsp_2019_102622 crossref_primary_10_1016_j_asoc_2025_112798 crossref_primary_10_1007_s11042_023_15329_6 crossref_primary_10_1186_s13635_021_00116_3 crossref_primary_10_1016_j_bspc_2022_103517 crossref_primary_10_1121_10_0001933 crossref_primary_10_1016_j_oceaneng_2024_119137 crossref_primary_10_1155_2023_8830894 crossref_primary_10_1007_s11265_020_01532_3 crossref_primary_10_1186_s13636_024_00335_9 crossref_primary_10_1017_ATSIP_2020_9 crossref_primary_10_1007_s11042_021_11235_x crossref_primary_10_1007_s11042_022_12380_7 crossref_primary_10_1016_j_csl_2020_101132 crossref_primary_10_1109_TASLP_2023_3267610 crossref_primary_10_3390_computers13100256 crossref_primary_10_1016_j_csl_2020_101092 crossref_primary_10_1007_s42979_022_01557_4 crossref_primary_10_1109_LSP_2021_3089437 crossref_primary_10_31590_ejosat_780650 crossref_primary_10_1016_j_csl_2021_101301 crossref_primary_10_1109_ACCESS_2021_3098058 crossref_primary_10_1007_s10772_019_09602_z crossref_primary_10_1109_TASLP_2024_3414340 crossref_primary_10_3390_sym14020274 crossref_primary_10_1016_j_patrec_2020_07_009 crossref_primary_10_1016_j_csl_2021_101281 crossref_primary_10_1109_TASLP_2024_3468005 crossref_primary_10_1016_j_dsp_2022_103712 crossref_primary_10_1016_j_csl_2019_05_007 crossref_primary_10_1017_ATSIP_2020_26 crossref_primary_10_1109_LSP_2020_2996908 crossref_primary_10_1007_s12652_021_02960_0 crossref_primary_10_1016_j_apacoust_2019_107017 crossref_primary_10_1109_JSTSP_2020_2999828 crossref_primary_10_1186_s13636_020_00173_5 crossref_primary_10_1007_s13748_020_00216_0 crossref_primary_10_1016_j_procs_2022_11_086 crossref_primary_10_3390_app12031454 crossref_primary_10_1016_j_specom_2022_11_005 crossref_primary_10_1016_j_future_2024_06_022 crossref_primary_10_1109_ACCESS_2023_3301616 crossref_primary_10_1109_LSP_2024_3370490 crossref_primary_10_1016_j_apacoust_2023_109568 crossref_primary_10_1109_TIFS_2023_3324724 crossref_primary_10_14500_aro_11636 crossref_primary_10_1007_s10772_020_09785_w crossref_primary_10_1016_j_csl_2024_101732 crossref_primary_10_1109_ACCESS_2020_2974290 crossref_primary_10_1007_s11416_023_00491_0 crossref_primary_10_1007_s11042_020_09281_y crossref_primary_10_1088_1742_6596_1952_2_022030 crossref_primary_10_35378_gujs_1062788 crossref_primary_10_1007_s10772_021_09876_2 crossref_primary_10_1016_j_aeue_2019_152837 crossref_primary_10_1109_ACCESS_2023_3254880 crossref_primary_10_1109_TASLP_2020_3011320 crossref_primary_10_1016_j_neucom_2023_126799 crossref_primary_10_1016_j_csl_2022_101423 crossref_primary_10_1109_TASLP_2023_3325971 crossref_primary_10_1007_s10772_024_10125_5 crossref_primary_10_1007_s10772_024_10129_1 crossref_primary_10_1007_s11042_020_10212_0 crossref_primary_10_1016_j_csl_2020_101140 crossref_primary_10_1109_TASLP_2021_3124420 crossref_primary_10_1016_j_csl_2022_101421 crossref_primary_10_1088_1742_6596_1856_1_012006 crossref_primary_10_1109_TBIOM_2021_3059479 crossref_primary_10_1109_ACCESS_2024_3415355 crossref_primary_10_1109_TASLP_2018_2851155 crossref_primary_10_1109_TASLP_2024_3358056 crossref_primary_10_1109_ACCESS_2023_3333866 crossref_primary_10_1016_j_dsp_2017_10_010 crossref_primary_10_3390_app13148488 crossref_primary_10_1109_LSP_2024_3381890 crossref_primary_10_1016_j_jisa_2023_103507 crossref_primary_10_1109_TNSRE_2020_3035392 crossref_primary_10_1007_s11042_023_16378_7 crossref_primary_10_1038_s41598_025_93133_y crossref_primary_10_1109_TIFS_2020_3039045 crossref_primary_10_1109_TASLP_2021_3060810 crossref_primary_10_1007_s42835_019_00202_0 crossref_primary_10_1017_ATSIP_2019_21 crossref_primary_10_1007_s00034_022_01974_z crossref_primary_10_3390_app9142833 crossref_primary_10_1109_TIFS_2021_3082303 crossref_primary_10_1109_TDSC_2022_3215280 crossref_primary_10_1109_ACCESS_2020_3013066 crossref_primary_10_1007_s11042_021_11365_2 crossref_primary_10_1109_ACCESS_2024_3421281 crossref_primary_10_1111_exsy_12670 crossref_primary_10_1007_s00034_023_02505_0 crossref_primary_10_1007_s11042_023_15891_z crossref_primary_10_1109_TASLP_2020_2984089 crossref_primary_10_1016_j_jmsy_2025_01_007 crossref_primary_10_1109_TIFS_2019_2956589 crossref_primary_10_1016_j_asoc_2024_111413 crossref_primary_10_1109_MCAS_2019_2945210 crossref_primary_10_1007_s10772_019_09604_x crossref_primary_10_1016_j_csl_2020_101161 crossref_primary_10_1016_j_specom_2024_103153 |
Cites_doi | 10.1016/j.specom.2014.10.005 10.1121/1.400476 10.1109/78.157221 10.1007/978-3-642-19530-3_25 10.1109/MSECP.2003.1193209 10.1109/TASL.2012.2201472 10.1016/0378-5955(90)90170-T 10.1147/sj.403.0614 10.1109/TASSP.1980.1163420 10.1016/j.sigpro.2009.03.024 10.1109/TIFS.2014.2349158 10.1109/TSP.2011.2160054 10.1121/1.426728 |
ContentType | Journal Article |
Copyright | 2017 Elsevier Ltd |
Copyright_xml | – notice: 2017 Elsevier Ltd |
DBID | AAYXX CITATION |
DOI | 10.1016/j.csl.2017.01.001 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1095-8363 |
EndPage | 535 |
ExternalDocumentID | 10_1016_j_csl_2017_01_001 S0885230816303114 |
GroupedDBID | --K --M .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 6J9 7-5 71M 8P~ 9JN 9JO AACTN AADFP AAEDT AAEDW AAFJI AAGJA AAGUQ AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABFRF ABJNI ABMAC ABMMH ABOYX ABTAH ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACXNI ACZNC ADBBV ADEZE ADFGL ADJOM ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFKWA AFTJW AFYLN AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD ASPBG AVARZ AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CAG COF CS3 DM4 DU5 EBS EFBJH EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q G8K GBLVA GBOLZ HLZ HMW HMY HVGLF HZ~ IHE J1W JJJVA KOM LG5 LX9 M3U M3X M41 MO0 MVM N9A O-L O9- OAUVE OKEIE OZT P-8 P-9 P2P PC. PRBVW Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SPS SSB SSO SSS SST SSV SSY SSZ T5K TN5 UHS WUQ XFK XPP YK3 ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACRPL ACVFH ADCNI ADMHG ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c406t-d2e7682cf07f050b9079ffadce1d613ae0f0dda22c36774faca42514a0bcdf3f3 |
IEDL.DBID | .~1 |
ISSN | 0885-2308 |
IngestDate | Thu Apr 24 23:05:01 EDT 2025 Tue Jul 01 00:18:33 EDT 2025 Fri Feb 23 02:29:31 EST 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Spoofing countermeasures Cepstral analysis Presentation attack detection Automatic speaker verification Constant Q transform |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c406t-d2e7682cf07f050b9079ffadce1d613ae0f0dda22c36774faca42514a0bcdf3f3 |
OpenAccessLink | https://zenodo.org/record/3448624 |
PageCount | 20 |
ParticipantIDs | crossref_citationtrail_10_1016_j_csl_2017_01_001 crossref_primary_10_1016_j_csl_2017_01_001 elsevier_sciencedirect_doi_10_1016_j_csl_2017_01_001 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | September 2017 2017-09-00 |
PublicationDateYYYYMMDD | 2017-09-01 |
PublicationDate_xml | – month: 09 year: 2017 text: September 2017 |
PublicationDecade | 2010 |
PublicationTitle | Computer speech & language |
PublicationYear | 2017 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Gabor (bib0019) 1946; 93 Brown (bib0005) 1999; 105 Pellom, Hansen (bib0041) 1999; 2 Lindberg, Blomberg (bib0032) 1999 Brown (bib0004) 1991; 89 Sahidullah, Delgado, Todisco, Yu, Kinnunen, Evans, Tan (bib0045) September 8–12, 2016 Campisi (bib0006) 2013 Chingovska, Anjos, Marcel (bib0010) 2014; 9 Kinnunen, Sahidullah, Kukanov, Delgado, Todisco, Sarkar, Thomsen, Hautamaki, Evans, Tan (bib0025) September 8–12, 2016 Vetterli, Herley (bib0051) 1992; 40 Hanilçi, Kinnunen, Sahidullah, Sizov (bib0021) 2015 Prabhakar, Pankanti, Jain (bib0003) 2003; 1 Evans, Kinnunen, Yamagishi (bib0016) 2013 Masuko, Hitotsumatsu, Tokuda, Kobayashi (bib0034) 1999 Evans, Yamagishi, Kinnunen (bib0017) 2013 Sahidullah, Kinnunen, Hanilçi (bib0047) 2015 Villalba, J., Lleida, E., March 8–10, 2011. Detecting replay attacks from far-field recordings on speaker verification systems. Proceedings of the 2011 European Workshop on Biometrics and ID management (BioID 2011), Brandenburg (Havel), Germany. pp. 274–285. De Leon, Pucher, Yamagishi, Hernaez, Saratxaga (bib0013) 2012; 20 Mont-Reynaud, B., 1986. The Bounded-Q approach to time-varying spectral analysis. Technical Report, Stanford University, CCRMA. Mallat (bib0033) 2008 Chakroborty, Roy, Saha (bib0007) 2007; 4 Chen, Qian, Dinkel, Chen, Yu (bib0009) 2015 Korshunov, Marcel (bib0026) 2016 Ergunay, Khoury, Lazaridis, Marcel (bib0015) 2015 Delgado, Todisco, Sahidullah, Sarkar, Evans, Kinnunen, Tan (bib0014) 2016 Davis, Mermelstein (bib0012) 1980; 28 Alegre, Vipperla, Amehraye, Evans (bib0002) 2013 Korshunov, Marcel, Muckenhirn, Gonçalves, Mello, Violato, Simões, Neto, de Assis Angeloni, Stuchi, Dinkel, Chen, Qian, Paul, Saha, Sahidullah (bib0028) 2016 Jaiswal, Fitzgerald, Coyle, Rickard (bib0023) 2013 Maymon, Oppenheim (bib0035) 2011; 59 Oppenheim, Schafer, Buck (bib0039) 1999 Schorkhuber, Klapuri, Sontacch (bib0048) 2013; 61 Patel, Patil (bib0040) 2015 Radocy, Boyle (bib0043) 1979 Wu, Evans, Kinnunen, Yamagishi, Alegre, Li (bib0054) 2015; 66 Alegre, Evans, Kinnunen, Wu, Yamagishi (bib0001) 2014 Novoselov, Kozlov, Lavrentyeva, Simonchik, Shchemelinin (bib0038) 2015 Wolberg (bib0053) 1988 Wu, Kinnunen, Evans, Yamagishi, Hanilci, Sahidullah, Sizov (bib0056) 2015 Evans, Kinnunen, Yamagishi (bib0018) 2013 Youngberg, Boll (bib0057) 1978; 3 Chakroborty, Roy, Saha (bib0008) 2008; 2 Ratha, Connell, Bolle (bib0044) 2001; 40 Korshunov, Marcel, Muckenhirn (bib0027) 2016 Lau, Wagner, Tran (bib0030) 2004 Lee, Larcher, Wang, Kenny, Brümmer, van Leeuwen, Aronowitz, Kockmann, Vaquero, Ma, Li, Stafylakis, Alam, Swart, Perez (bib0031) September 6–10, 2015 Moore (bib0037) 2003 Kinnunen, Sahidullah, Falcone, Costantini, González Hautamäki, Thomsen, Sarkar, Tan, Delgado, Todisco, Evans, Hautamäki, Lee (bib0024) 2017 Perrot, Aversano, Blouet, Charbit, Chollet (bib0042) 2005; 1 Costantini, Perfetti, Todisco (bib0011) 2009; 89 Todisco, Delgado, Evans (bib0050) 2016 Jacob, Anoop (bib0022) 2014; 4 Sahidullah, Kinnunen, Hanilçi (bib0046) 2015 Lau, Tran, Wagner (bib0029) September 14–16, 2005 Wu, Kinnunen, Evans, Yamagishi (bib0055) 2014 Schrkhuber, Klapuri, Holighaus, Drfler (bib0049) 2014 Glasberg, Moore (bib0020) 1990; 47 Hanilçi (10.1016/j.csl.2017.01.001_bib0021) 2015 Wu (10.1016/j.csl.2017.01.001_bib0055) 2014 Ratha (10.1016/j.csl.2017.01.001_bib0044) 2001; 40 Sahidullah (10.1016/j.csl.2017.01.001_bib0045) 2016 Kinnunen (10.1016/j.csl.2017.01.001_bib0024) 2017 Alegre (10.1016/j.csl.2017.01.001_bib0002) 2013 Evans (10.1016/j.csl.2017.01.001_bib0018) 2013 Oppenheim (10.1016/j.csl.2017.01.001_bib0039) 1999 Schrkhuber (10.1016/j.csl.2017.01.001_sbref0048) 2014 Wu (10.1016/j.csl.2017.01.001_bib0054) 2015; 66 Masuko (10.1016/j.csl.2017.01.001_bib0034) 1999 Pellom (10.1016/j.csl.2017.01.001_bib0041) 1999; 2 Brown (10.1016/j.csl.2017.01.001_bib0004) 1991; 89 Novoselov (10.1016/j.csl.2017.01.001_bib0038) 2015 Chakroborty (10.1016/j.csl.2017.01.001_bib0007) 2007; 4 Lau (10.1016/j.csl.2017.01.001_bib0030) 2004 Korshunov (10.1016/j.csl.2017.01.001_bib0026) 2016 10.1016/j.csl.2017.01.001_bib0052 Evans (10.1016/j.csl.2017.01.001_bib0017) 2013 Lindberg (10.1016/j.csl.2017.01.001_bib0032) 1999 Todisco (10.1016/j.csl.2017.01.001_bib0050) 2016 Costantini (10.1016/j.csl.2017.01.001_bib0011) 2009; 89 Lau (10.1016/j.csl.2017.01.001_sbref0029) 2005 Ergunay (10.1016/j.csl.2017.01.001_bib0015) 2015 Jacob (10.1016/j.csl.2017.01.001_bib0022) 2014; 4 Chingovska (10.1016/j.csl.2017.01.001_bib0010) 2014; 9 Brown (10.1016/j.csl.2017.01.001_bib0005) 1999; 105 Davis (10.1016/j.csl.2017.01.001_bib0012) 1980; 28 Wu (10.1016/j.csl.2017.01.001_bib0056) 2015 Lee (10.1016/j.csl.2017.01.001_sbref0031) 2015 Radocy (10.1016/j.csl.2017.01.001_bib0043) 1979 Perrot (10.1016/j.csl.2017.01.001_bib0042) 2005; 1 Schorkhuber (10.1016/j.csl.2017.01.001_bib0048) 2013; 61 De Leon (10.1016/j.csl.2017.01.001_bib0013) 2012; 20 Wolberg (10.1016/j.csl.2017.01.001_bib0053) 1988 Chakroborty (10.1016/j.csl.2017.01.001_bib0008) 2008; 2 Sahidullah (10.1016/j.csl.2017.01.001_bib0047) 2015 Campisi (10.1016/j.csl.2017.01.001_bib0006) 2013 Alegre (10.1016/j.csl.2017.01.001_bib0001) 2014 Korshunov (10.1016/j.csl.2017.01.001_bib0027) 2016 Mallat (10.1016/j.csl.2017.01.001_bib0033) 2008 Moore (10.1016/j.csl.2017.01.001_bib0037) 2003 Jaiswal (10.1016/j.csl.2017.01.001_bib0023) 2013 Evans (10.1016/j.csl.2017.01.001_bib0016) 2013 Kinnunen (10.1016/j.csl.2017.01.001_bib0025) 2016 Maymon (10.1016/j.csl.2017.01.001_bib0035) 2011; 59 Vetterli (10.1016/j.csl.2017.01.001_bib0051) 1992; 40 Glasberg (10.1016/j.csl.2017.01.001_bib0020) 1990; 47 10.1016/j.csl.2017.01.001_bib0036 Youngberg (10.1016/j.csl.2017.01.001_bib0057) 1978; 3 Prabhakar (10.1016/j.csl.2017.01.001_bib0003) 2003; 1 Sahidullah (10.1016/j.csl.2017.01.001_bib0046) 2015 Patel (10.1016/j.csl.2017.01.001_bib0040) 2015 Chen (10.1016/j.csl.2017.01.001_bib0009) 2015 Gabor (10.1016/j.csl.2017.01.001_bib0019) 1946; 93 Delgado (10.1016/j.csl.2017.01.001_bib0014) 2016 Korshunov (10.1016/j.csl.2017.01.001_bib0028) 2016 |
References_xml | – start-page: 15 year: September 14–16, 2005 end-page: 21 ident: bib0029 article-title: Testing voice mimicry with the YOHO speaker verification corpus publication-title: Proceedings of the Ninth International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005 – year: 1999 ident: bib0032 article-title: Vulnerability in speaker verification a study of technical impostor techniques publication-title: Proceedings of the 1999 European Conference on Speech Communication and Technology (Eurospeech) – volume: 89 start-page: 1798 year: 2009 end-page: 1811 ident: bib0011 article-title: Event based transcription system for polyphonic piano music publication-title: Signal Process. – volume: 47 start-page: 103 year: 1990 end-page: 138 ident: bib0020 article-title: Derivation of auditory filter shapes from notched-noise data publication-title: Hear. Res. – reference: Villalba, J., Lleida, E., March 8–10, 2011. Detecting replay attacks from far-field recordings on speaker verification systems. Proceedings of the 2011 European Workshop on Biometrics and ID management (BioID 2011), Brandenburg (Havel), Germany. pp. 274–285. – year: 2016 ident: bib0028 article-title: Overview of BTAS 2016 speaker anti-spoofing competition publication-title: Proceedings of the 2016 IEEE International Conference on Biometrics: Theory, Applications and Systems – year: September 8–12, 2016 ident: bib0045 article-title: Integrated spoofing countermeasures and automatic speaker verification: an evaluation on ASVspoof 2015 publication-title: Proceedings of the 2016 Annual Conference of the International Speech Communication Association (INTERSPEECH 2016) – start-page: 1 year: 2015 end-page: 6 ident: bib0015 article-title: On the vulnerability of speaker verification to realistic voice spoofing publication-title: Proceedings of the Seventh IEEE International Conference on Biometrics Theory, Applications and Systems (BTAS) – volume: 2 start-page: 837 year: 1999 end-page: 840 ident: bib0041 article-title: An experimental study of speaker verification sensitivity to computer voice-altered imposters publication-title: Proceedings of the 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) – year: 2013 ident: bib0002 article-title: A new speaker verification spoofing countermeasure based on local binary patterns publication-title: Proceedings of the 2013 Annual Conference of the International Speech Communication Association (INTERSPEECH) – year: 2013 ident: bib0018 article-title: Spoofing and countermeasures for automatic speaker verification publication-title: Proceedings of the Fourteenth Annual Conference of the International Speech Communication Association (INTERSPEECH) – volume: 40 start-page: 614 year: 2001 end-page: 634 ident: bib0044 article-title: Enhancing security and privacy in biometrics-based authentication systems publication-title: IBM Syst. J. – year: 1988 ident: bib0053 article-title: Cubic Spline Interpolation: A Review – year: 2016 ident: bib0026 article-title: Cross-database evaluation of audio-based spoofing detection systems publication-title: Proceedings of the 2016 Annual Conference of the International Speech Communication Association (INTERSPEECH 2016) – year: 2013 ident: bib0006 article-title: Security and Privacy in Biometrics – year: 2015 ident: bib0038 article-title: STC anti-spoofing systems for the asvspoof 2015 challenge publication-title: Proceedings of the 2015 Annual Conference of the International Speech Communication Association (INTERSPEECH 2015) – year: 2015 ident: bib0009 article-title: Robust deep feature for spoofing detection – the SJTU system for ASVspoof 2015 challenge publication-title: Proceedings of the 2015 Annual Conference of the International Speech Communication Association (INTERSPEECH) – year: 2008 ident: bib0033 article-title: A Wavelet Tour of Signal Processing: The Sparse Way – volume: 66 start-page: 130 year: 2015 end-page: 153 ident: bib0054 article-title: Spoofing and countermeasures for speaker verification: a survey publication-title: Speech Commun. – volume: 3 start-page: 375 year: 1978 end-page: 378 ident: bib0057 article-title: Constant-q signal analysis and synthesis publication-title: Proceedings of the 1978 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) – start-page: 2087 year: 2015 end-page: 2091 ident: bib0047 article-title: A comparison of features for synthetic speech detection publication-title: Proceedings of the 2016 Annual Conference of the International Speech Communication Association (INTERSPEECH) – year: 1999 ident: bib0039 article-title: Discrete-time Signal Processing – volume: 4 start-page: 123 year: 2014 end-page: 127 ident: bib0022 article-title: Design and implementation of polyphase decimation filter publication-title: In: International Journal of Computer Networks and Wireless Communications (IJCNWC), – start-page: 145 year: 2004 end-page: 148 ident: bib0030 article-title: Vulnerability of speaker verification to voice mimicking publication-title: Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing – year: 2015 ident: bib0056 article-title: ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge publication-title: Proceedings of the 2015 Annual Conference of the International Speech Communication Association (INTERSPEECH) – start-page: 1 year: 2013 end-page: 7 ident: bib0023 article-title: Towards shifted NMF for improved monaural separation publication-title: Proceedings of the Twenty-fourth IET Irish Signals and Systems Conference (ISSC 2013) – volume: 89 start-page: 425 year: 1991 end-page: 434 ident: bib0004 article-title: Calculation of a constant Q spectral transform publication-title: J. Acoust. Soc. Am. – volume: 93 start-page: 429 year: 1946 end-page: 457 ident: bib0019 article-title: Theory of communication publication-title: J. Inst. Elect. Eng. – volume: 20 start-page: 2280 year: 2012 end-page: 2290 ident: bib0013 article-title: Evaluation of speaker verification security and detection of HMM-based synthetic speech publication-title: IEEE Trans. Audio Speech Lang. Process. – year: 2014 ident: bib0001 article-title: Anti-spoofing: voice databases publication-title: Encyclopedia of Biometrics – volume: 105 start-page: 1933 year: 1999 end-page: 1941 ident: bib0005 article-title: Computer identification of musical instruments using pattern recognition with cepstral coefficients as features publication-title: J. Acoust. Soc. Am. – year: 2016 ident: bib0027 article-title: Overview of BTAS 2016 speaker anti-spoofing competition publication-title: Proceedings of the Eighth IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS) – start-page: 2996 year: September 6–10, 2015 end-page: 3000 ident: bib0031 article-title: The reddots data collection for speaker recognition publication-title: Proceedings of the Sixteenth Annual Conference of the International Speech Communication Association (INTERSPEECH 2015) – start-page: 1223 year: 1999 end-page: 1226 ident: bib0034 article-title: On the security of HMM-based speaker verification systems against imposture using synthetic speech publication-title: Proceedings of the 1999 European Conference on Speech Communication and Technology – year: September 8–12, 2016 ident: bib0025 article-title: Utterance verification for text-dependent speaker recognition: a comparative assessment using the RedDots corpus publication-title: Proceedings of the 2016 Annual Conference of the International Speech Communication Association (INTERSPEECH 2016) – year: 1979 ident: bib0043 article-title: Psychological Foundations of Musical Behavior – volume: 28 start-page: 357 year: 1980 end-page: 366 ident: bib0012 article-title: Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences publication-title: IEEE Trans. Acoust. Speech Signal Process. – volume: 59 start-page: 4745 year: 2011 end-page: 4758 ident: bib0035 article-title: Sinc interpolation of nonuniform samples publication-title: IEEE Trans. Signal Process. – year: 2016 ident: bib0014 article-title: Further optimisations of constant Q cepstral processing for integrated utterance verification and text-dependent speaker verification publication-title: Proceedings of the 2016 IEEE Workshop on Spoken Language Technology (SLT 2016) – start-page: 925 year: 2013 end-page: 929 ident: bib0016 article-title: Spoofing and countermeasures for automatic speaker verification publication-title: Proceedings of the 2013 Annual Conference of the International Speech Communication Association (INTERSPEECH) – volume: 4 start-page: 114 year: 2007 end-page: 122 ident: bib0007 article-title: Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks publication-title: Int. J. Signal Process. – year: 2003 ident: bib0037 article-title: An Introduction to the Psychology of Hearing – volume: 61 start-page: 425 year: 2013 end-page: 434 ident: bib0048 article-title: Audio pitch shifting using the constant-Q transform publication-title: J. Audio Eng. Soc. – start-page: 2087 year: 2015 end-page: 2091 ident: bib0021 article-title: Classifiers for synthetic speech detection: a comparison publication-title: Proceedings of the 2015 Annual Conference of the International Speech Communication Association (INTERSPEECH) – reference: Mont-Reynaud, B., 1986. The Bounded-Q approach to time-varying spectral analysis. Technical Report, Stanford University, CCRMA. – start-page: 2062 year: 2015 end-page: 2066 ident: bib0040 article-title: Combining evidences from Mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech publication-title: Proceedings of the 2015 Annual Conference of the International Speech Communication Association (INTERSPEECH 2015) – volume: 40 start-page: 2207 year: 1992 end-page: 2232 ident: bib0051 article-title: Wavelets and filter banks: theory and design publication-title: IEEE Trans. Signal Process. – year: 2016 ident: bib0050 article-title: A new feature for automatic speaker verification anti-spoofing: constant Q cepstral coefficients publication-title: Proceedings of the 2016 Odysssey – volume: 2 start-page: 100 year: 2008 end-page: 107 ident: bib0008 article-title: Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks publication-title: Int. J. Electr. Comput. Energ. Electron. Commun. Eng. – volume: 9 start-page: 2264 year: 2014 end-page: 2276 ident: bib0010 article-title: Biometrics evaluation under spoofing attacks publication-title: IEEE Trans. Inf. Forensics Secur. – year: 2015 ident: bib0046 article-title: A comparison of features for synthetic speech detection publication-title: Proceedings of the 2016 Annual Conference of the International Speech Communication Association (INTERSPEECH) – year: 2017 ident: bib0024 article-title: Reddots replayed: a new replay spoofing attack corpus for text-dependent speaker verification research publication-title: Proceedings of the 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) – volume: 1 start-page: 33 year: 2003 end-page: 42 ident: bib0003 article-title: Biometric recognition: security and privacy concerns publication-title: In IEEE Security & Privacy – year: 2014 ident: bib0055 article-title: ASVspoof 2015: the first automatic verification spoofing and countermeasures challenge evaluation plan publication-title: IEEE Signal Processing Society Speech and language Technical Committee Newsletter – year: 2013 ident: bib0017 article-title: Spoofing and countermeasures for speaker verification: a need for standard corpora, protocols and metrics publication-title: In IEEE Signal Processing Society Speech and Language Technical Committee Newsletter. – year: 2014 ident: bib0049 article-title: A Matlab toolbox for efficient perfect reconstruction time-frequency transforms with log-frequency resolution publication-title: Proceedings of the Fifty-third Conference on Semantic Audio on Engineering Society – volume: 1 start-page: 17 year: 2005 end-page: 20 ident: bib0042 article-title: Voice forgery using ALISP: Indexation in a client memory publication-title: Proceedings of the 2005 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) – volume: 4 start-page: 114 year: 2007 ident: 10.1016/j.csl.2017.01.001_bib0007 article-title: Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks publication-title: Int. J. Signal Process. – volume: 2 start-page: 100 issue: 11 year: 2008 ident: 10.1016/j.csl.2017.01.001_bib0008 article-title: Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks publication-title: Int. J. Electr. Comput. Energ. Electron. Commun. Eng. – start-page: 2087 year: 2015 ident: 10.1016/j.csl.2017.01.001_bib0047 article-title: A comparison of features for synthetic speech detection – start-page: 925 year: 2013 ident: 10.1016/j.csl.2017.01.001_bib0016 article-title: Spoofing and countermeasures for automatic speaker verification – volume: 66 start-page: 130 year: 2015 ident: 10.1016/j.csl.2017.01.001_bib0054 article-title: Spoofing and countermeasures for speaker verification: a survey publication-title: Speech Commun. doi: 10.1016/j.specom.2014.10.005 – year: 2015 ident: 10.1016/j.csl.2017.01.001_bib0009 article-title: Robust deep feature for spoofing detection – the SJTU system for ASVspoof 2015 challenge – year: 2013 ident: 10.1016/j.csl.2017.01.001_bib0002 article-title: A new speaker verification spoofing countermeasure based on local binary patterns – year: 2016 ident: 10.1016/j.csl.2017.01.001_bib0014 article-title: Further optimisations of constant Q cepstral processing for integrated utterance verification and text-dependent speaker verification – year: 2015 ident: 10.1016/j.csl.2017.01.001_bib0056 article-title: ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge – year: 2013 ident: 10.1016/j.csl.2017.01.001_bib0018 article-title: Spoofing and countermeasures for automatic speaker verification – volume: 89 start-page: 425 issue: 1 year: 1991 ident: 10.1016/j.csl.2017.01.001_bib0004 article-title: Calculation of a constant Q spectral transform publication-title: J. Acoust. Soc. Am. doi: 10.1121/1.400476 – start-page: 2087 year: 2015 ident: 10.1016/j.csl.2017.01.001_bib0021 article-title: Classifiers for synthetic speech detection: a comparison – year: 2015 ident: 10.1016/j.csl.2017.01.001_bib0046 article-title: A comparison of features for synthetic speech detection – volume: 3 start-page: 375 year: 1978 ident: 10.1016/j.csl.2017.01.001_bib0057 article-title: Constant-q signal analysis and synthesis – start-page: 145 year: 2004 ident: 10.1016/j.csl.2017.01.001_bib0030 article-title: Vulnerability of speaker verification to voice mimicking – year: 1999 ident: 10.1016/j.csl.2017.01.001_bib0039 – volume: 40 start-page: 2207 issue: 9 year: 1992 ident: 10.1016/j.csl.2017.01.001_bib0051 article-title: Wavelets and filter banks: theory and design publication-title: IEEE Trans. Signal Process. doi: 10.1109/78.157221 – year: 2016 ident: 10.1016/j.csl.2017.01.001_bib0050 article-title: A new feature for automatic speaker verification anti-spoofing: constant Q cepstral coefficients – year: 2013 ident: 10.1016/j.csl.2017.01.001_bib0006 – ident: 10.1016/j.csl.2017.01.001_bib0052 doi: 10.1007/978-3-642-19530-3_25 – year: 2003 ident: 10.1016/j.csl.2017.01.001_bib0037 – volume: 1 start-page: 33 issue: 2 year: 2003 ident: 10.1016/j.csl.2017.01.001_bib0003 article-title: Biometric recognition: security and privacy concerns publication-title: In IEEE Security & Privacy doi: 10.1109/MSECP.2003.1193209 – volume: 20 start-page: 2280 issue: 8 year: 2012 ident: 10.1016/j.csl.2017.01.001_bib0013 article-title: Evaluation of speaker verification security and detection of HMM-based synthetic speech publication-title: IEEE Trans. Audio Speech Lang. Process. doi: 10.1109/TASL.2012.2201472 – start-page: 15 year: 2005 ident: 10.1016/j.csl.2017.01.001_sbref0029 article-title: Testing voice mimicry with the YOHO speaker verification corpus – volume: 4 start-page: 123 issue: 2 year: 2014 ident: 10.1016/j.csl.2017.01.001_bib0022 article-title: Design and implementation of polyphase decimation filter publication-title: In: International Journal of Computer Networks and Wireless Communications (IJCNWC), – start-page: 2996 year: 2015 ident: 10.1016/j.csl.2017.01.001_sbref0031 article-title: The reddots data collection for speaker recognition – volume: 61 start-page: 425 issue: 7–8 year: 2013 ident: 10.1016/j.csl.2017.01.001_bib0048 article-title: Audio pitch shifting using the constant-Q transform publication-title: J. Audio Eng. Soc. – ident: 10.1016/j.csl.2017.01.001_bib0036 – year: 2013 ident: 10.1016/j.csl.2017.01.001_bib0017 article-title: Spoofing and countermeasures for speaker verification: a need for standard corpora, protocols and metrics publication-title: In IEEE Signal Processing Society Speech and Language Technical Committee Newsletter. – volume: 47 start-page: 103 issue: 1 year: 1990 ident: 10.1016/j.csl.2017.01.001_bib0020 article-title: Derivation of auditory filter shapes from notched-noise data publication-title: Hear. Res. doi: 10.1016/0378-5955(90)90170-T – year: 2017 ident: 10.1016/j.csl.2017.01.001_bib0024 article-title: Reddots replayed: a new replay spoofing attack corpus for text-dependent speaker verification research – volume: 2 start-page: 837 year: 1999 ident: 10.1016/j.csl.2017.01.001_bib0041 article-title: An experimental study of speaker verification sensitivity to computer voice-altered imposters – volume: 40 start-page: 614 issue: 3 year: 2001 ident: 10.1016/j.csl.2017.01.001_bib0044 article-title: Enhancing security and privacy in biometrics-based authentication systems publication-title: IBM Syst. J. doi: 10.1147/sj.403.0614 – year: 1979 ident: 10.1016/j.csl.2017.01.001_bib0043 – volume: 28 start-page: 357 issue: 4 year: 1980 ident: 10.1016/j.csl.2017.01.001_bib0012 article-title: Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences publication-title: IEEE Trans. Acoust. Speech Signal Process. doi: 10.1109/TASSP.1980.1163420 – start-page: 1223 year: 1999 ident: 10.1016/j.csl.2017.01.001_bib0034 article-title: On the security of HMM-based speaker verification systems against imposture using synthetic speech – year: 2016 ident: 10.1016/j.csl.2017.01.001_bib0045 article-title: Integrated spoofing countermeasures and automatic speaker verification: an evaluation on ASVspoof 2015 – start-page: 1 year: 2015 ident: 10.1016/j.csl.2017.01.001_bib0015 article-title: On the vulnerability of speaker verification to realistic voice spoofing – year: 2014 ident: 10.1016/j.csl.2017.01.001_sbref0048 article-title: A Matlab toolbox for efficient perfect reconstruction time-frequency transforms with log-frequency resolution – start-page: 2062 year: 2015 ident: 10.1016/j.csl.2017.01.001_bib0040 article-title: Combining evidences from Mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech – year: 2014 ident: 10.1016/j.csl.2017.01.001_bib0055 article-title: ASVspoof 2015: the first automatic verification spoofing and countermeasures challenge evaluation plan – year: 2016 ident: 10.1016/j.csl.2017.01.001_bib0028 article-title: Overview of BTAS 2016 speaker anti-spoofing competition – year: 2008 ident: 10.1016/j.csl.2017.01.001_bib0033 – volume: 89 start-page: 1798 issue: 9 year: 2009 ident: 10.1016/j.csl.2017.01.001_bib0011 article-title: Event based transcription system for polyphonic piano music publication-title: Signal Process. doi: 10.1016/j.sigpro.2009.03.024 – year: 1988 ident: 10.1016/j.csl.2017.01.001_bib0053 – volume: 9 start-page: 2264 issue: 12 year: 2014 ident: 10.1016/j.csl.2017.01.001_bib0010 article-title: Biometrics evaluation under spoofing attacks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2014.2349158 – start-page: 1 year: 2013 ident: 10.1016/j.csl.2017.01.001_bib0023 article-title: Towards shifted NMF for improved monaural separation – year: 2016 ident: 10.1016/j.csl.2017.01.001_bib0026 article-title: Cross-database evaluation of audio-based spoofing detection systems – volume: 59 start-page: 4745 issue: 10 year: 2011 ident: 10.1016/j.csl.2017.01.001_bib0035 article-title: Sinc interpolation of nonuniform samples publication-title: IEEE Trans. Signal Process. doi: 10.1109/TSP.2011.2160054 – year: 2014 ident: 10.1016/j.csl.2017.01.001_bib0001 article-title: Anti-spoofing: voice databases – year: 2015 ident: 10.1016/j.csl.2017.01.001_bib0038 article-title: STC anti-spoofing systems for the asvspoof 2015 challenge – year: 1999 ident: 10.1016/j.csl.2017.01.001_bib0032 article-title: Vulnerability in speaker verification a study of technical impostor techniques – year: 2016 ident: 10.1016/j.csl.2017.01.001_bib0027 article-title: Overview of BTAS 2016 speaker anti-spoofing competition – volume: 105 start-page: 1933 issue: 3 year: 1999 ident: 10.1016/j.csl.2017.01.001_bib0005 article-title: Computer identification of musical instruments using pattern recognition with cepstral coefficients as features publication-title: J. Acoust. Soc. Am. doi: 10.1121/1.426728 – year: 2016 ident: 10.1016/j.csl.2017.01.001_bib0025 article-title: Utterance verification for text-dependent speaker recognition: a comparative assessment using the RedDots corpus – volume: 93 start-page: 429 year: 1946 ident: 10.1016/j.csl.2017.01.001_bib0019 article-title: Theory of communication publication-title: J. Inst. Elect. Eng. – volume: 1 start-page: 17 year: 2005 ident: 10.1016/j.csl.2017.01.001_bib0042 article-title: Voice forgery using ALISP: Indexation in a client memory |
SSID | ssj0006547 |
Score | 2.6036599 |
Snippet | •Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 516 |
SubjectTerms | Automatic speaker verification Cepstral analysis Constant Q transform Presentation attack detection Spoofing countermeasures |
Title | Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification |
URI | https://dx.doi.org/10.1016/j.csl.2017.01.001 |
Volume | 45 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB5KvejBR1Wsj5KDJ2Ftdjf78laKpSoURAs9uWTzkKq0RbdXf7uTbFYrogePuyTsMpnMfEm-fANwmjJfJEGhvUTJzDNXKz2eMd_TkdAZZ5jihFX7HMXDMbueRJMG9Ou7MIZW6WJ_FdNttHZvus6a3cV02r3D-WG2NFNEFOiZtpg1Y4nx8vP3L5qHKa5bIcnIM63rk03L8RJv5vTBT6xyp6sL8yM3reSbwTZsOqBIetW_7EBDzVqwVRdhIG5OtmBjRVFwFx76Fd4ryS0RamH3MYiYKysUYTgTF6RHcCWLLjV7JLZQBIbmap-QIH4lfFnOrYortlL8Gb-Evm7oRHYE92A8uLzvDz1XQsETaPfSk4HC9UQgNE00jWiBS-FMay6F8iUmcq6oplLyIBBhjEBQc8FxEvuM00JIHepwH5qz-UwdAElpKDIEMIUIfCZVnOowjbK4CLURrde6DbQ2Xi6cvrgpc_GS10SypxztnRt759Q3ZLo2nH12WVTiGn81ZvWI5N88JMfg_3u3w_91O4J181SxyY6hWb4u1QnCj7LoWP_qwFrv6mY4-gCZatsE |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT8IwFH8hcFAPfqBG_OzBk8lC9715I0QCgiRGSDi5dF1rUDOIjv_f164jGKMHr1tftry-j1_b198DuI48m4dOKq1QZLGlrlZaLPZsS_pcxszDFMc12-c46E-9-5k_q0G3ugujyipN7C9juo7W5knbaLO9nM_bT-gfakszQkSBlqmaWTcUO5Vfh0ZnMOyP1wFZ9dctwaRvKYHqcFOXefFPdQBhh5q807SG-ZGeNlJObx92DVYknfJ3DqAm8ibsVX0YiHHLJuxskAoewnO3hHwFeSRcLPVWBuELobkiVNnELekQXMyiVeUvRPeKwOhcbhUShLCErYqFJnLFUYK94ZfQ3FVFkZ7EI5j27ibdvmW6KFgcVV9YmSNwSeFwSUNJfZriajiWkmVc2BnmciaopFnGHIe7AWJByThDP7Y9RlOeSVe6x1DPF7k4ARJRl8eIYVLu2F4mgki6kR8HqSsVb72ULaCV8hJuKMZVp4v3pKole01Q34nSd0JtVU_Xgpu1yLLk1_hrsFfNSPLNSBKM_7-Lnf5P7Aq2-pOHUTIajIdnsK3elMVl51AvPlbiAtFIkV4aa_sCI0vdtQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Constant+Q+cepstral+coefficients%3A+A+spoofing+countermeasure+for+automatic+speaker+verification&rft.jtitle=Computer+speech+%26+language&rft.au=Todisco%2C+Massimiliano&rft.au=Delgado%2C+H%C3%A9ctor&rft.au=Evans%2C+Nicholas&rft.date=2017-09-01&rft.issn=0885-2308&rft.volume=45&rft.spage=516&rft.epage=535&rft_id=info:doi/10.1016%2Fj.csl.2017.01.001&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_csl_2017_01_001 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0885-2308&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0885-2308&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0885-2308&client=summon |