Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification

•Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable spectro-temporal resolution key to detection performance.•State-of-the-art performance across three standard databases.•Cross-database resul...

Full description

Saved in:
Bibliographic Details
Published inComputer speech & language Vol. 45; pp. 516 - 535
Main Authors Todisco, Massimiliano, Delgado, Héctor, Evans, Nicholas
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.09.2017
Subjects
Online AccessGet full text
ISSN0885-2308
1095-8363
DOI10.1016/j.csl.2017.01.001

Cover

Loading…
Abstract •Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable spectro-temporal resolution key to detection performance.•State-of-the-art performance across three standard databases.•Cross-database results point towards new approach for generalisation. Recent evaluations such as ASVspoof 2015 and the similarly-named AVspoof have stimulated a great deal of progress to develop spoofing countermeasures for automatic speaker verification. This paper reports an approach which combines speech signal analysis using the constant Q transform with traditional cepstral processing. The resulting constant Q cepstral coefficients (CQCCs) were introduced recently and have proven to be an effective spoofing countermeasure. An extension of previous work, the paper reports an assessment of CQCCs generalisation across three different databases and shows that they deliver state-of-the-art performance in each case. The benefit of CQCC features stems from a variable spectro-temporal resolution which, while being fundamentally different to that used by most automatic speaker verification system front-ends, also captures reliably the tell-tale signs of manipulation artefacts which are indicative of spoofing attacks. The second contribution relates to a cross-database evaluation. Results show that CQCC configuration is sensitive to the general form of spoofing attack and use case scenario. This finding suggests that the past single-system pursuit of generalised spoofing detection may need rethinking.
AbstractList •Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable spectro-temporal resolution key to detection performance.•State-of-the-art performance across three standard databases.•Cross-database results point towards new approach for generalisation. Recent evaluations such as ASVspoof 2015 and the similarly-named AVspoof have stimulated a great deal of progress to develop spoofing countermeasures for automatic speaker verification. This paper reports an approach which combines speech signal analysis using the constant Q transform with traditional cepstral processing. The resulting constant Q cepstral coefficients (CQCCs) were introduced recently and have proven to be an effective spoofing countermeasure. An extension of previous work, the paper reports an assessment of CQCCs generalisation across three different databases and shows that they deliver state-of-the-art performance in each case. The benefit of CQCC features stems from a variable spectro-temporal resolution which, while being fundamentally different to that used by most automatic speaker verification system front-ends, also captures reliably the tell-tale signs of manipulation artefacts which are indicative of spoofing attacks. The second contribution relates to a cross-database evaluation. Results show that CQCC configuration is sensitive to the general form of spoofing attack and use case scenario. This finding suggests that the past single-system pursuit of generalised spoofing detection may need rethinking.
Author Todisco, Massimiliano
Evans, Nicholas
Delgado, Héctor
Author_xml – sequence: 1
  givenname: Massimiliano
  surname: Todisco
  fullname: Todisco, Massimiliano
  email: todisco@eurecom.fr
– sequence: 2
  givenname: Héctor
  surname: Delgado
  fullname: Delgado, Héctor
– sequence: 3
  givenname: Nicholas
  surname: Evans
  fullname: Evans, Nicholas
BookMark eNp9kMtKQzEQhoNUsK0-gLu8wDlOzi2nuirFGxRE0K0hTSaSepqUJC349qbWlYuuBmbmG-b_JmTkvENCrhmUDFh3sy5VHMoKGC-BlQDsjIwZzNqir7t6RMbQ921R1dBfkEmMawDo2oaPycfCu5ikS_SVKtzGFORAlUdjrLLoUrylcxq33hvrPvNg5xKGDcq4C0iND1Tukt_IZFXeQvmFge4x2EznnneX5NzIIeLVX52S94f7t8VTsXx5fF7Ml4VqoEuFrpB3faUMcAMtrGbAZ8ZIrZDpjtUSwYDWsqpU3XHeGKlkU7WskbBS2tSmnhJ-vKuCjzGgEcqm3w9yIDsIBuKgSaxF1iQOmgQwkTVlkv0jt8FuZPg-ydwdGcyR9haDiAdZCrUNqJLQ3p6gfwDS8YVm
CitedBy_id crossref_primary_10_1016_j_specom_2023_102973
crossref_primary_10_1016_j_apacoust_2021_108283
crossref_primary_10_1016_j_specom_2020_10_003
crossref_primary_10_1016_j_csl_2020_101115
crossref_primary_10_1016_j_csl_2020_101114
crossref_primary_10_3390_app9081539
crossref_primary_10_1109_ACCESS_2023_3275790
crossref_primary_10_1016_j_compeleceng_2024_109355
crossref_primary_10_1016_j_csl_2023_101599
crossref_primary_10_1109_TASLP_2020_3036777
crossref_primary_10_1109_TASLP_2023_3288416
crossref_primary_10_1016_j_csl_2017_12_001
crossref_primary_10_1109_TIFS_2024_3431888
crossref_primary_10_1109_LSP_2023_3262419
crossref_primary_10_1016_j_jksuci_2022_02_024
crossref_primary_10_1109_TASLP_2022_3233236
crossref_primary_10_1016_j_eswa_2022_116597
crossref_primary_10_1007_s10462_023_10539_8
crossref_primary_10_1109_TASLP_2023_3306711
crossref_primary_10_1007_s10772_018_9534_5
crossref_primary_10_1109_ACCESS_2023_3332561
crossref_primary_10_1002_eng2_70087
crossref_primary_10_1109_TASLP_2019_2946897
crossref_primary_10_1109_ACCESS_2019_2960369
crossref_primary_10_1016_j_csl_2017_10_001
crossref_primary_10_1016_j_apacoust_2024_110221
crossref_primary_10_1007_s12652_023_04684_9
crossref_primary_10_1109_ACCESS_2019_2923806
crossref_primary_10_1145_3659607
crossref_primary_10_3390_s23115196
crossref_primary_10_1016_j_dsp_2019_102622
crossref_primary_10_1016_j_asoc_2025_112798
crossref_primary_10_1007_s11042_023_15329_6
crossref_primary_10_1186_s13635_021_00116_3
crossref_primary_10_1016_j_bspc_2022_103517
crossref_primary_10_1121_10_0001933
crossref_primary_10_1016_j_oceaneng_2024_119137
crossref_primary_10_1155_2023_8830894
crossref_primary_10_1007_s11265_020_01532_3
crossref_primary_10_1186_s13636_024_00335_9
crossref_primary_10_1017_ATSIP_2020_9
crossref_primary_10_1007_s11042_021_11235_x
crossref_primary_10_1007_s11042_022_12380_7
crossref_primary_10_1016_j_csl_2020_101132
crossref_primary_10_1109_TASLP_2023_3267610
crossref_primary_10_3390_computers13100256
crossref_primary_10_1016_j_csl_2020_101092
crossref_primary_10_1007_s42979_022_01557_4
crossref_primary_10_1109_LSP_2021_3089437
crossref_primary_10_31590_ejosat_780650
crossref_primary_10_1016_j_csl_2021_101301
crossref_primary_10_1109_ACCESS_2021_3098058
crossref_primary_10_1007_s10772_019_09602_z
crossref_primary_10_1109_TASLP_2024_3414340
crossref_primary_10_3390_sym14020274
crossref_primary_10_1016_j_patrec_2020_07_009
crossref_primary_10_1016_j_csl_2021_101281
crossref_primary_10_1109_TASLP_2024_3468005
crossref_primary_10_1016_j_dsp_2022_103712
crossref_primary_10_1016_j_csl_2019_05_007
crossref_primary_10_1017_ATSIP_2020_26
crossref_primary_10_1109_LSP_2020_2996908
crossref_primary_10_1007_s12652_021_02960_0
crossref_primary_10_1016_j_apacoust_2019_107017
crossref_primary_10_1109_JSTSP_2020_2999828
crossref_primary_10_1186_s13636_020_00173_5
crossref_primary_10_1007_s13748_020_00216_0
crossref_primary_10_1016_j_procs_2022_11_086
crossref_primary_10_3390_app12031454
crossref_primary_10_1016_j_specom_2022_11_005
crossref_primary_10_1016_j_future_2024_06_022
crossref_primary_10_1109_ACCESS_2023_3301616
crossref_primary_10_1109_LSP_2024_3370490
crossref_primary_10_1016_j_apacoust_2023_109568
crossref_primary_10_1109_TIFS_2023_3324724
crossref_primary_10_14500_aro_11636
crossref_primary_10_1007_s10772_020_09785_w
crossref_primary_10_1016_j_csl_2024_101732
crossref_primary_10_1109_ACCESS_2020_2974290
crossref_primary_10_1007_s11416_023_00491_0
crossref_primary_10_1007_s11042_020_09281_y
crossref_primary_10_1088_1742_6596_1952_2_022030
crossref_primary_10_35378_gujs_1062788
crossref_primary_10_1007_s10772_021_09876_2
crossref_primary_10_1016_j_aeue_2019_152837
crossref_primary_10_1109_ACCESS_2023_3254880
crossref_primary_10_1109_TASLP_2020_3011320
crossref_primary_10_1016_j_neucom_2023_126799
crossref_primary_10_1016_j_csl_2022_101423
crossref_primary_10_1109_TASLP_2023_3325971
crossref_primary_10_1007_s10772_024_10125_5
crossref_primary_10_1007_s10772_024_10129_1
crossref_primary_10_1007_s11042_020_10212_0
crossref_primary_10_1016_j_csl_2020_101140
crossref_primary_10_1109_TASLP_2021_3124420
crossref_primary_10_1016_j_csl_2022_101421
crossref_primary_10_1088_1742_6596_1856_1_012006
crossref_primary_10_1109_TBIOM_2021_3059479
crossref_primary_10_1109_ACCESS_2024_3415355
crossref_primary_10_1109_TASLP_2018_2851155
crossref_primary_10_1109_TASLP_2024_3358056
crossref_primary_10_1109_ACCESS_2023_3333866
crossref_primary_10_1016_j_dsp_2017_10_010
crossref_primary_10_3390_app13148488
crossref_primary_10_1109_LSP_2024_3381890
crossref_primary_10_1016_j_jisa_2023_103507
crossref_primary_10_1109_TNSRE_2020_3035392
crossref_primary_10_1007_s11042_023_16378_7
crossref_primary_10_1038_s41598_025_93133_y
crossref_primary_10_1109_TIFS_2020_3039045
crossref_primary_10_1109_TASLP_2021_3060810
crossref_primary_10_1007_s42835_019_00202_0
crossref_primary_10_1017_ATSIP_2019_21
crossref_primary_10_1007_s00034_022_01974_z
crossref_primary_10_3390_app9142833
crossref_primary_10_1109_TIFS_2021_3082303
crossref_primary_10_1109_TDSC_2022_3215280
crossref_primary_10_1109_ACCESS_2020_3013066
crossref_primary_10_1007_s11042_021_11365_2
crossref_primary_10_1109_ACCESS_2024_3421281
crossref_primary_10_1111_exsy_12670
crossref_primary_10_1007_s00034_023_02505_0
crossref_primary_10_1007_s11042_023_15891_z
crossref_primary_10_1109_TASLP_2020_2984089
crossref_primary_10_1016_j_jmsy_2025_01_007
crossref_primary_10_1109_TIFS_2019_2956589
crossref_primary_10_1016_j_asoc_2024_111413
crossref_primary_10_1109_MCAS_2019_2945210
crossref_primary_10_1007_s10772_019_09604_x
crossref_primary_10_1016_j_csl_2020_101161
crossref_primary_10_1016_j_specom_2024_103153
Cites_doi 10.1016/j.specom.2014.10.005
10.1121/1.400476
10.1109/78.157221
10.1007/978-3-642-19530-3_25
10.1109/MSECP.2003.1193209
10.1109/TASL.2012.2201472
10.1016/0378-5955(90)90170-T
10.1147/sj.403.0614
10.1109/TASSP.1980.1163420
10.1016/j.sigpro.2009.03.024
10.1109/TIFS.2014.2349158
10.1109/TSP.2011.2160054
10.1121/1.426728
ContentType Journal Article
Copyright 2017 Elsevier Ltd
Copyright_xml – notice: 2017 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.csl.2017.01.001
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1095-8363
EndPage 535
ExternalDocumentID 10_1016_j_csl_2017_01_001
S0885230816303114
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
6J9
7-5
71M
8P~
9JN
9JO
AACTN
AADFP
AAEDT
AAEDW
AAFJI
AAGJA
AAGUQ
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABFRF
ABJNI
ABMAC
ABMMH
ABOYX
ABTAH
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACXNI
ACZNC
ADBBV
ADEZE
ADFGL
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AFYLN
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
ASPBG
AVARZ
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CAG
COF
CS3
DM4
DU5
EBS
EFBJH
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
G8K
GBLVA
GBOLZ
HLZ
HMW
HMY
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG5
LX9
M3U
M3X
M41
MO0
MVM
N9A
O-L
O9-
OAUVE
OKEIE
OZT
P-8
P-9
P2P
PC.
PRBVW
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SPS
SSB
SSO
SSS
SST
SSV
SSY
SSZ
T5K
TN5
UHS
WUQ
XFK
XPP
YK3
ZMT
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACRPL
ACVFH
ADCNI
ADMHG
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
ID FETCH-LOGICAL-c406t-d2e7682cf07f050b9079ffadce1d613ae0f0dda22c36774faca42514a0bcdf3f3
IEDL.DBID .~1
ISSN 0885-2308
IngestDate Thu Apr 24 23:05:01 EDT 2025
Tue Jul 01 00:18:33 EDT 2025
Fri Feb 23 02:29:31 EST 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Spoofing countermeasures
Cepstral analysis
Presentation attack detection
Automatic speaker verification
Constant Q transform
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c406t-d2e7682cf07f050b9079ffadce1d613ae0f0dda22c36774faca42514a0bcdf3f3
OpenAccessLink https://zenodo.org/record/3448624
PageCount 20
ParticipantIDs crossref_citationtrail_10_1016_j_csl_2017_01_001
crossref_primary_10_1016_j_csl_2017_01_001
elsevier_sciencedirect_doi_10_1016_j_csl_2017_01_001
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate September 2017
2017-09-00
PublicationDateYYYYMMDD 2017-09-01
PublicationDate_xml – month: 09
  year: 2017
  text: September 2017
PublicationDecade 2010
PublicationTitle Computer speech & language
PublicationYear 2017
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Gabor (bib0019) 1946; 93
Brown (bib0005) 1999; 105
Pellom, Hansen (bib0041) 1999; 2
Lindberg, Blomberg (bib0032) 1999
Brown (bib0004) 1991; 89
Sahidullah, Delgado, Todisco, Yu, Kinnunen, Evans, Tan (bib0045) September 8–12, 2016
Campisi (bib0006) 2013
Chingovska, Anjos, Marcel (bib0010) 2014; 9
Kinnunen, Sahidullah, Kukanov, Delgado, Todisco, Sarkar, Thomsen, Hautamaki, Evans, Tan (bib0025) September 8–12, 2016
Vetterli, Herley (bib0051) 1992; 40
Hanilçi, Kinnunen, Sahidullah, Sizov (bib0021) 2015
Prabhakar, Pankanti, Jain (bib0003) 2003; 1
Evans, Kinnunen, Yamagishi (bib0016) 2013
Masuko, Hitotsumatsu, Tokuda, Kobayashi (bib0034) 1999
Evans, Yamagishi, Kinnunen (bib0017) 2013
Sahidullah, Kinnunen, Hanilçi (bib0047) 2015
Villalba, J., Lleida, E., March 8–10, 2011. Detecting replay attacks from far-field recordings on speaker verification systems. Proceedings of the 2011 European Workshop on Biometrics and ID management (BioID 2011), Brandenburg (Havel), Germany. pp. 274–285.
De Leon, Pucher, Yamagishi, Hernaez, Saratxaga (bib0013) 2012; 20
Mont-Reynaud, B., 1986. The Bounded-Q approach to time-varying spectral analysis. Technical Report, Stanford University, CCRMA.
Mallat (bib0033) 2008
Chakroborty, Roy, Saha (bib0007) 2007; 4
Chen, Qian, Dinkel, Chen, Yu (bib0009) 2015
Korshunov, Marcel (bib0026) 2016
Ergunay, Khoury, Lazaridis, Marcel (bib0015) 2015
Delgado, Todisco, Sahidullah, Sarkar, Evans, Kinnunen, Tan (bib0014) 2016
Davis, Mermelstein (bib0012) 1980; 28
Alegre, Vipperla, Amehraye, Evans (bib0002) 2013
Korshunov, Marcel, Muckenhirn, Gonçalves, Mello, Violato, Simões, Neto, de Assis Angeloni, Stuchi, Dinkel, Chen, Qian, Paul, Saha, Sahidullah (bib0028) 2016
Jaiswal, Fitzgerald, Coyle, Rickard (bib0023) 2013
Maymon, Oppenheim (bib0035) 2011; 59
Oppenheim, Schafer, Buck (bib0039) 1999
Schorkhuber, Klapuri, Sontacch (bib0048) 2013; 61
Patel, Patil (bib0040) 2015
Radocy, Boyle (bib0043) 1979
Wu, Evans, Kinnunen, Yamagishi, Alegre, Li (bib0054) 2015; 66
Alegre, Evans, Kinnunen, Wu, Yamagishi (bib0001) 2014
Novoselov, Kozlov, Lavrentyeva, Simonchik, Shchemelinin (bib0038) 2015
Wolberg (bib0053) 1988
Wu, Kinnunen, Evans, Yamagishi, Hanilci, Sahidullah, Sizov (bib0056) 2015
Evans, Kinnunen, Yamagishi (bib0018) 2013
Youngberg, Boll (bib0057) 1978; 3
Chakroborty, Roy, Saha (bib0008) 2008; 2
Ratha, Connell, Bolle (bib0044) 2001; 40
Korshunov, Marcel, Muckenhirn (bib0027) 2016
Lau, Wagner, Tran (bib0030) 2004
Lee, Larcher, Wang, Kenny, Brümmer, van Leeuwen, Aronowitz, Kockmann, Vaquero, Ma, Li, Stafylakis, Alam, Swart, Perez (bib0031) September 6–10, 2015
Moore (bib0037) 2003
Kinnunen, Sahidullah, Falcone, Costantini, González Hautamäki, Thomsen, Sarkar, Tan, Delgado, Todisco, Evans, Hautamäki, Lee (bib0024) 2017
Perrot, Aversano, Blouet, Charbit, Chollet (bib0042) 2005; 1
Costantini, Perfetti, Todisco (bib0011) 2009; 89
Todisco, Delgado, Evans (bib0050) 2016
Jacob, Anoop (bib0022) 2014; 4
Sahidullah, Kinnunen, Hanilçi (bib0046) 2015
Lau, Tran, Wagner (bib0029) September 14–16, 2005
Wu, Kinnunen, Evans, Yamagishi (bib0055) 2014
Schrkhuber, Klapuri, Holighaus, Drfler (bib0049) 2014
Glasberg, Moore (bib0020) 1990; 47
Hanilçi (10.1016/j.csl.2017.01.001_bib0021) 2015
Wu (10.1016/j.csl.2017.01.001_bib0055) 2014
Ratha (10.1016/j.csl.2017.01.001_bib0044) 2001; 40
Sahidullah (10.1016/j.csl.2017.01.001_bib0045) 2016
Kinnunen (10.1016/j.csl.2017.01.001_bib0024) 2017
Alegre (10.1016/j.csl.2017.01.001_bib0002) 2013
Evans (10.1016/j.csl.2017.01.001_bib0018) 2013
Oppenheim (10.1016/j.csl.2017.01.001_bib0039) 1999
Schrkhuber (10.1016/j.csl.2017.01.001_sbref0048) 2014
Wu (10.1016/j.csl.2017.01.001_bib0054) 2015; 66
Masuko (10.1016/j.csl.2017.01.001_bib0034) 1999
Pellom (10.1016/j.csl.2017.01.001_bib0041) 1999; 2
Brown (10.1016/j.csl.2017.01.001_bib0004) 1991; 89
Novoselov (10.1016/j.csl.2017.01.001_bib0038) 2015
Chakroborty (10.1016/j.csl.2017.01.001_bib0007) 2007; 4
Lau (10.1016/j.csl.2017.01.001_bib0030) 2004
Korshunov (10.1016/j.csl.2017.01.001_bib0026) 2016
10.1016/j.csl.2017.01.001_bib0052
Evans (10.1016/j.csl.2017.01.001_bib0017) 2013
Lindberg (10.1016/j.csl.2017.01.001_bib0032) 1999
Todisco (10.1016/j.csl.2017.01.001_bib0050) 2016
Costantini (10.1016/j.csl.2017.01.001_bib0011) 2009; 89
Lau (10.1016/j.csl.2017.01.001_sbref0029) 2005
Ergunay (10.1016/j.csl.2017.01.001_bib0015) 2015
Jacob (10.1016/j.csl.2017.01.001_bib0022) 2014; 4
Chingovska (10.1016/j.csl.2017.01.001_bib0010) 2014; 9
Brown (10.1016/j.csl.2017.01.001_bib0005) 1999; 105
Davis (10.1016/j.csl.2017.01.001_bib0012) 1980; 28
Wu (10.1016/j.csl.2017.01.001_bib0056) 2015
Lee (10.1016/j.csl.2017.01.001_sbref0031) 2015
Radocy (10.1016/j.csl.2017.01.001_bib0043) 1979
Perrot (10.1016/j.csl.2017.01.001_bib0042) 2005; 1
Schorkhuber (10.1016/j.csl.2017.01.001_bib0048) 2013; 61
De Leon (10.1016/j.csl.2017.01.001_bib0013) 2012; 20
Wolberg (10.1016/j.csl.2017.01.001_bib0053) 1988
Chakroborty (10.1016/j.csl.2017.01.001_bib0008) 2008; 2
Sahidullah (10.1016/j.csl.2017.01.001_bib0047) 2015
Campisi (10.1016/j.csl.2017.01.001_bib0006) 2013
Alegre (10.1016/j.csl.2017.01.001_bib0001) 2014
Korshunov (10.1016/j.csl.2017.01.001_bib0027) 2016
Mallat (10.1016/j.csl.2017.01.001_bib0033) 2008
Moore (10.1016/j.csl.2017.01.001_bib0037) 2003
Jaiswal (10.1016/j.csl.2017.01.001_bib0023) 2013
Evans (10.1016/j.csl.2017.01.001_bib0016) 2013
Kinnunen (10.1016/j.csl.2017.01.001_bib0025) 2016
Maymon (10.1016/j.csl.2017.01.001_bib0035) 2011; 59
Vetterli (10.1016/j.csl.2017.01.001_bib0051) 1992; 40
Glasberg (10.1016/j.csl.2017.01.001_bib0020) 1990; 47
10.1016/j.csl.2017.01.001_bib0036
Youngberg (10.1016/j.csl.2017.01.001_bib0057) 1978; 3
Prabhakar (10.1016/j.csl.2017.01.001_bib0003) 2003; 1
Sahidullah (10.1016/j.csl.2017.01.001_bib0046) 2015
Patel (10.1016/j.csl.2017.01.001_bib0040) 2015
Chen (10.1016/j.csl.2017.01.001_bib0009) 2015
Gabor (10.1016/j.csl.2017.01.001_bib0019) 1946; 93
Delgado (10.1016/j.csl.2017.01.001_bib0014) 2016
Korshunov (10.1016/j.csl.2017.01.001_bib0028) 2016
References_xml – start-page: 15
  year: September 14–16, 2005
  end-page: 21
  ident: bib0029
  article-title: Testing voice mimicry with the YOHO speaker verification corpus
  publication-title: Proceedings of the Ninth International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005
– year: 1999
  ident: bib0032
  article-title: Vulnerability in speaker verification a study of technical impostor techniques
  publication-title: Proceedings of the 1999 European Conference on Speech Communication and Technology (Eurospeech)
– volume: 89
  start-page: 1798
  year: 2009
  end-page: 1811
  ident: bib0011
  article-title: Event based transcription system for polyphonic piano music
  publication-title: Signal Process.
– volume: 47
  start-page: 103
  year: 1990
  end-page: 138
  ident: bib0020
  article-title: Derivation of auditory filter shapes from notched-noise data
  publication-title: Hear. Res.
– reference: Villalba, J., Lleida, E., March 8–10, 2011. Detecting replay attacks from far-field recordings on speaker verification systems. Proceedings of the 2011 European Workshop on Biometrics and ID management (BioID 2011), Brandenburg (Havel), Germany. pp. 274–285.
– year: 2016
  ident: bib0028
  article-title: Overview of BTAS 2016 speaker anti-spoofing competition
  publication-title: Proceedings of the 2016 IEEE International Conference on Biometrics: Theory, Applications and Systems
– year: September 8–12, 2016
  ident: bib0045
  article-title: Integrated spoofing countermeasures and automatic speaker verification: an evaluation on ASVspoof 2015
  publication-title: Proceedings of the 2016 Annual Conference of the International Speech Communication Association (INTERSPEECH 2016)
– start-page: 1
  year: 2015
  end-page: 6
  ident: bib0015
  article-title: On the vulnerability of speaker verification to realistic voice spoofing
  publication-title: Proceedings of the Seventh IEEE International Conference on Biometrics Theory, Applications and Systems (BTAS)
– volume: 2
  start-page: 837
  year: 1999
  end-page: 840
  ident: bib0041
  article-title: An experimental study of speaker verification sensitivity to computer voice-altered imposters
  publication-title: Proceedings of the 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
– year: 2013
  ident: bib0002
  article-title: A new speaker verification spoofing countermeasure based on local binary patterns
  publication-title: Proceedings of the 2013 Annual Conference of the International Speech Communication Association (INTERSPEECH)
– year: 2013
  ident: bib0018
  article-title: Spoofing and countermeasures for automatic speaker verification
  publication-title: Proceedings of the Fourteenth Annual Conference of the International Speech Communication Association (INTERSPEECH)
– volume: 40
  start-page: 614
  year: 2001
  end-page: 634
  ident: bib0044
  article-title: Enhancing security and privacy in biometrics-based authentication systems
  publication-title: IBM Syst. J.
– year: 1988
  ident: bib0053
  article-title: Cubic Spline Interpolation: A Review
– year: 2016
  ident: bib0026
  article-title: Cross-database evaluation of audio-based spoofing detection systems
  publication-title: Proceedings of the 2016 Annual Conference of the International Speech Communication Association (INTERSPEECH 2016)
– year: 2013
  ident: bib0006
  article-title: Security and Privacy in Biometrics
– year: 2015
  ident: bib0038
  article-title: STC anti-spoofing systems for the asvspoof 2015 challenge
  publication-title: Proceedings of the 2015 Annual Conference of the International Speech Communication Association (INTERSPEECH 2015)
– year: 2015
  ident: bib0009
  article-title: Robust deep feature for spoofing detection – the SJTU system for ASVspoof 2015 challenge
  publication-title: Proceedings of the 2015 Annual Conference of the International Speech Communication Association (INTERSPEECH)
– year: 2008
  ident: bib0033
  article-title: A Wavelet Tour of Signal Processing: The Sparse Way
– volume: 66
  start-page: 130
  year: 2015
  end-page: 153
  ident: bib0054
  article-title: Spoofing and countermeasures for speaker verification: a survey
  publication-title: Speech Commun.
– volume: 3
  start-page: 375
  year: 1978
  end-page: 378
  ident: bib0057
  article-title: Constant-q signal analysis and synthesis
  publication-title: Proceedings of the 1978 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
– start-page: 2087
  year: 2015
  end-page: 2091
  ident: bib0047
  article-title: A comparison of features for synthetic speech detection
  publication-title: Proceedings of the 2016 Annual Conference of the International Speech Communication Association (INTERSPEECH)
– year: 1999
  ident: bib0039
  article-title: Discrete-time Signal Processing
– volume: 4
  start-page: 123
  year: 2014
  end-page: 127
  ident: bib0022
  article-title: Design and implementation of polyphase decimation filter
  publication-title: In: International Journal of Computer Networks and Wireless Communications (IJCNWC),
– start-page: 145
  year: 2004
  end-page: 148
  ident: bib0030
  article-title: Vulnerability of speaker verification to voice mimicking
  publication-title: Proceedings of the 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing
– year: 2015
  ident: bib0056
  article-title: ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge
  publication-title: Proceedings of the 2015 Annual Conference of the International Speech Communication Association (INTERSPEECH)
– start-page: 1
  year: 2013
  end-page: 7
  ident: bib0023
  article-title: Towards shifted NMF for improved monaural separation
  publication-title: Proceedings of the Twenty-fourth IET Irish Signals and Systems Conference (ISSC 2013)
– volume: 89
  start-page: 425
  year: 1991
  end-page: 434
  ident: bib0004
  article-title: Calculation of a constant Q spectral transform
  publication-title: J. Acoust. Soc. Am.
– volume: 93
  start-page: 429
  year: 1946
  end-page: 457
  ident: bib0019
  article-title: Theory of communication
  publication-title: J. Inst. Elect. Eng.
– volume: 20
  start-page: 2280
  year: 2012
  end-page: 2290
  ident: bib0013
  article-title: Evaluation of speaker verification security and detection of HMM-based synthetic speech
  publication-title: IEEE Trans. Audio Speech Lang. Process.
– year: 2014
  ident: bib0001
  article-title: Anti-spoofing: voice databases
  publication-title: Encyclopedia of Biometrics
– volume: 105
  start-page: 1933
  year: 1999
  end-page: 1941
  ident: bib0005
  article-title: Computer identification of musical instruments using pattern recognition with cepstral coefficients as features
  publication-title: J. Acoust. Soc. Am.
– year: 2016
  ident: bib0027
  article-title: Overview of BTAS 2016 speaker anti-spoofing competition
  publication-title: Proceedings of the Eighth IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS)
– start-page: 2996
  year: September 6–10, 2015
  end-page: 3000
  ident: bib0031
  article-title: The reddots data collection for speaker recognition
  publication-title: Proceedings of the Sixteenth Annual Conference of the International Speech Communication Association (INTERSPEECH 2015)
– start-page: 1223
  year: 1999
  end-page: 1226
  ident: bib0034
  article-title: On the security of HMM-based speaker verification systems against imposture using synthetic speech
  publication-title: Proceedings of the 1999 European Conference on Speech Communication and Technology
– year: September 8–12, 2016
  ident: bib0025
  article-title: Utterance verification for text-dependent speaker recognition: a comparative assessment using the RedDots corpus
  publication-title: Proceedings of the 2016 Annual Conference of the International Speech Communication Association (INTERSPEECH 2016)
– year: 1979
  ident: bib0043
  article-title: Psychological Foundations of Musical Behavior
– volume: 28
  start-page: 357
  year: 1980
  end-page: 366
  ident: bib0012
  article-title: Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences
  publication-title: IEEE Trans. Acoust. Speech Signal Process.
– volume: 59
  start-page: 4745
  year: 2011
  end-page: 4758
  ident: bib0035
  article-title: Sinc interpolation of nonuniform samples
  publication-title: IEEE Trans. Signal Process.
– year: 2016
  ident: bib0014
  article-title: Further optimisations of constant Q cepstral processing for integrated utterance verification and text-dependent speaker verification
  publication-title: Proceedings of the 2016 IEEE Workshop on Spoken Language Technology (SLT 2016)
– start-page: 925
  year: 2013
  end-page: 929
  ident: bib0016
  article-title: Spoofing and countermeasures for automatic speaker verification
  publication-title: Proceedings of the 2013 Annual Conference of the International Speech Communication Association (INTERSPEECH)
– volume: 4
  start-page: 114
  year: 2007
  end-page: 122
  ident: bib0007
  article-title: Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks
  publication-title: Int. J. Signal Process.
– year: 2003
  ident: bib0037
  article-title: An Introduction to the Psychology of Hearing
– volume: 61
  start-page: 425
  year: 2013
  end-page: 434
  ident: bib0048
  article-title: Audio pitch shifting using the constant-Q transform
  publication-title: J. Audio Eng. Soc.
– start-page: 2087
  year: 2015
  end-page: 2091
  ident: bib0021
  article-title: Classifiers for synthetic speech detection: a comparison
  publication-title: Proceedings of the 2015 Annual Conference of the International Speech Communication Association (INTERSPEECH)
– reference: Mont-Reynaud, B., 1986. The Bounded-Q approach to time-varying spectral analysis. Technical Report, Stanford University, CCRMA.
– start-page: 2062
  year: 2015
  end-page: 2066
  ident: bib0040
  article-title: Combining evidences from Mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech
  publication-title: Proceedings of the 2015 Annual Conference of the International Speech Communication Association (INTERSPEECH 2015)
– volume: 40
  start-page: 2207
  year: 1992
  end-page: 2232
  ident: bib0051
  article-title: Wavelets and filter banks: theory and design
  publication-title: IEEE Trans. Signal Process.
– year: 2016
  ident: bib0050
  article-title: A new feature for automatic speaker verification anti-spoofing: constant Q cepstral coefficients
  publication-title: Proceedings of the 2016 Odysssey
– volume: 2
  start-page: 100
  year: 2008
  end-page: 107
  ident: bib0008
  article-title: Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks
  publication-title: Int. J. Electr. Comput. Energ. Electron. Commun. Eng.
– volume: 9
  start-page: 2264
  year: 2014
  end-page: 2276
  ident: bib0010
  article-title: Biometrics evaluation under spoofing attacks
  publication-title: IEEE Trans. Inf. Forensics Secur.
– year: 2015
  ident: bib0046
  article-title: A comparison of features for synthetic speech detection
  publication-title: Proceedings of the 2016 Annual Conference of the International Speech Communication Association (INTERSPEECH)
– year: 2017
  ident: bib0024
  article-title: Reddots replayed: a new replay spoofing attack corpus for text-dependent speaker verification research
  publication-title: Proceedings of the 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
– volume: 1
  start-page: 33
  year: 2003
  end-page: 42
  ident: bib0003
  article-title: Biometric recognition: security and privacy concerns
  publication-title: In IEEE Security & Privacy
– year: 2014
  ident: bib0055
  article-title: ASVspoof 2015: the first automatic verification spoofing and countermeasures challenge evaluation plan
  publication-title: IEEE Signal Processing Society Speech and language Technical Committee Newsletter
– year: 2013
  ident: bib0017
  article-title: Spoofing and countermeasures for speaker verification: a need for standard corpora, protocols and metrics
  publication-title: In IEEE Signal Processing Society Speech and Language Technical Committee Newsletter.
– year: 2014
  ident: bib0049
  article-title: A Matlab toolbox for efficient perfect reconstruction time-frequency transforms with log-frequency resolution
  publication-title: Proceedings of the Fifty-third Conference on Semantic Audio on Engineering Society
– volume: 1
  start-page: 17
  year: 2005
  end-page: 20
  ident: bib0042
  article-title: Voice forgery using ALISP: Indexation in a client memory
  publication-title: Proceedings of the 2005 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
– volume: 4
  start-page: 114
  year: 2007
  ident: 10.1016/j.csl.2017.01.001_bib0007
  article-title: Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks
  publication-title: Int. J. Signal Process.
– volume: 2
  start-page: 100
  issue: 11
  year: 2008
  ident: 10.1016/j.csl.2017.01.001_bib0008
  article-title: Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks
  publication-title: Int. J. Electr. Comput. Energ. Electron. Commun. Eng.
– start-page: 2087
  year: 2015
  ident: 10.1016/j.csl.2017.01.001_bib0047
  article-title: A comparison of features for synthetic speech detection
– start-page: 925
  year: 2013
  ident: 10.1016/j.csl.2017.01.001_bib0016
  article-title: Spoofing and countermeasures for automatic speaker verification
– volume: 66
  start-page: 130
  year: 2015
  ident: 10.1016/j.csl.2017.01.001_bib0054
  article-title: Spoofing and countermeasures for speaker verification: a survey
  publication-title: Speech Commun.
  doi: 10.1016/j.specom.2014.10.005
– year: 2015
  ident: 10.1016/j.csl.2017.01.001_bib0009
  article-title: Robust deep feature for spoofing detection – the SJTU system for ASVspoof 2015 challenge
– year: 2013
  ident: 10.1016/j.csl.2017.01.001_bib0002
  article-title: A new speaker verification spoofing countermeasure based on local binary patterns
– year: 2016
  ident: 10.1016/j.csl.2017.01.001_bib0014
  article-title: Further optimisations of constant Q cepstral processing for integrated utterance verification and text-dependent speaker verification
– year: 2015
  ident: 10.1016/j.csl.2017.01.001_bib0056
  article-title: ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge
– year: 2013
  ident: 10.1016/j.csl.2017.01.001_bib0018
  article-title: Spoofing and countermeasures for automatic speaker verification
– volume: 89
  start-page: 425
  issue: 1
  year: 1991
  ident: 10.1016/j.csl.2017.01.001_bib0004
  article-title: Calculation of a constant Q spectral transform
  publication-title: J. Acoust. Soc. Am.
  doi: 10.1121/1.400476
– start-page: 2087
  year: 2015
  ident: 10.1016/j.csl.2017.01.001_bib0021
  article-title: Classifiers for synthetic speech detection: a comparison
– year: 2015
  ident: 10.1016/j.csl.2017.01.001_bib0046
  article-title: A comparison of features for synthetic speech detection
– volume: 3
  start-page: 375
  year: 1978
  ident: 10.1016/j.csl.2017.01.001_bib0057
  article-title: Constant-q signal analysis and synthesis
– start-page: 145
  year: 2004
  ident: 10.1016/j.csl.2017.01.001_bib0030
  article-title: Vulnerability of speaker verification to voice mimicking
– year: 1999
  ident: 10.1016/j.csl.2017.01.001_bib0039
– volume: 40
  start-page: 2207
  issue: 9
  year: 1992
  ident: 10.1016/j.csl.2017.01.001_bib0051
  article-title: Wavelets and filter banks: theory and design
  publication-title: IEEE Trans. Signal Process.
  doi: 10.1109/78.157221
– year: 2016
  ident: 10.1016/j.csl.2017.01.001_bib0050
  article-title: A new feature for automatic speaker verification anti-spoofing: constant Q cepstral coefficients
– year: 2013
  ident: 10.1016/j.csl.2017.01.001_bib0006
– ident: 10.1016/j.csl.2017.01.001_bib0052
  doi: 10.1007/978-3-642-19530-3_25
– year: 2003
  ident: 10.1016/j.csl.2017.01.001_bib0037
– volume: 1
  start-page: 33
  issue: 2
  year: 2003
  ident: 10.1016/j.csl.2017.01.001_bib0003
  article-title: Biometric recognition: security and privacy concerns
  publication-title: In IEEE Security & Privacy
  doi: 10.1109/MSECP.2003.1193209
– volume: 20
  start-page: 2280
  issue: 8
  year: 2012
  ident: 10.1016/j.csl.2017.01.001_bib0013
  article-title: Evaluation of speaker verification security and detection of HMM-based synthetic speech
  publication-title: IEEE Trans. Audio Speech Lang. Process.
  doi: 10.1109/TASL.2012.2201472
– start-page: 15
  year: 2005
  ident: 10.1016/j.csl.2017.01.001_sbref0029
  article-title: Testing voice mimicry with the YOHO speaker verification corpus
– volume: 4
  start-page: 123
  issue: 2
  year: 2014
  ident: 10.1016/j.csl.2017.01.001_bib0022
  article-title: Design and implementation of polyphase decimation filter
  publication-title: In: International Journal of Computer Networks and Wireless Communications (IJCNWC),
– start-page: 2996
  year: 2015
  ident: 10.1016/j.csl.2017.01.001_sbref0031
  article-title: The reddots data collection for speaker recognition
– volume: 61
  start-page: 425
  issue: 7–8
  year: 2013
  ident: 10.1016/j.csl.2017.01.001_bib0048
  article-title: Audio pitch shifting using the constant-Q transform
  publication-title: J. Audio Eng. Soc.
– ident: 10.1016/j.csl.2017.01.001_bib0036
– year: 2013
  ident: 10.1016/j.csl.2017.01.001_bib0017
  article-title: Spoofing and countermeasures for speaker verification: a need for standard corpora, protocols and metrics
  publication-title: In IEEE Signal Processing Society Speech and Language Technical Committee Newsletter.
– volume: 47
  start-page: 103
  issue: 1
  year: 1990
  ident: 10.1016/j.csl.2017.01.001_bib0020
  article-title: Derivation of auditory filter shapes from notched-noise data
  publication-title: Hear. Res.
  doi: 10.1016/0378-5955(90)90170-T
– year: 2017
  ident: 10.1016/j.csl.2017.01.001_bib0024
  article-title: Reddots replayed: a new replay spoofing attack corpus for text-dependent speaker verification research
– volume: 2
  start-page: 837
  year: 1999
  ident: 10.1016/j.csl.2017.01.001_bib0041
  article-title: An experimental study of speaker verification sensitivity to computer voice-altered imposters
– volume: 40
  start-page: 614
  issue: 3
  year: 2001
  ident: 10.1016/j.csl.2017.01.001_bib0044
  article-title: Enhancing security and privacy in biometrics-based authentication systems
  publication-title: IBM Syst. J.
  doi: 10.1147/sj.403.0614
– year: 1979
  ident: 10.1016/j.csl.2017.01.001_bib0043
– volume: 28
  start-page: 357
  issue: 4
  year: 1980
  ident: 10.1016/j.csl.2017.01.001_bib0012
  article-title: Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences
  publication-title: IEEE Trans. Acoust. Speech Signal Process.
  doi: 10.1109/TASSP.1980.1163420
– start-page: 1223
  year: 1999
  ident: 10.1016/j.csl.2017.01.001_bib0034
  article-title: On the security of HMM-based speaker verification systems against imposture using synthetic speech
– year: 2016
  ident: 10.1016/j.csl.2017.01.001_bib0045
  article-title: Integrated spoofing countermeasures and automatic speaker verification: an evaluation on ASVspoof 2015
– start-page: 1
  year: 2015
  ident: 10.1016/j.csl.2017.01.001_bib0015
  article-title: On the vulnerability of speaker verification to realistic voice spoofing
– year: 2014
  ident: 10.1016/j.csl.2017.01.001_sbref0048
  article-title: A Matlab toolbox for efficient perfect reconstruction time-frequency transforms with log-frequency resolution
– start-page: 2062
  year: 2015
  ident: 10.1016/j.csl.2017.01.001_bib0040
  article-title: Combining evidences from Mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech
– year: 2014
  ident: 10.1016/j.csl.2017.01.001_bib0055
  article-title: ASVspoof 2015: the first automatic verification spoofing and countermeasures challenge evaluation plan
– year: 2016
  ident: 10.1016/j.csl.2017.01.001_bib0028
  article-title: Overview of BTAS 2016 speaker anti-spoofing competition
– year: 2008
  ident: 10.1016/j.csl.2017.01.001_bib0033
– volume: 89
  start-page: 1798
  issue: 9
  year: 2009
  ident: 10.1016/j.csl.2017.01.001_bib0011
  article-title: Event based transcription system for polyphonic piano music
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2009.03.024
– year: 1988
  ident: 10.1016/j.csl.2017.01.001_bib0053
– volume: 9
  start-page: 2264
  issue: 12
  year: 2014
  ident: 10.1016/j.csl.2017.01.001_bib0010
  article-title: Biometrics evaluation under spoofing attacks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2014.2349158
– start-page: 1
  year: 2013
  ident: 10.1016/j.csl.2017.01.001_bib0023
  article-title: Towards shifted NMF for improved monaural separation
– year: 2016
  ident: 10.1016/j.csl.2017.01.001_bib0026
  article-title: Cross-database evaluation of audio-based spoofing detection systems
– volume: 59
  start-page: 4745
  issue: 10
  year: 2011
  ident: 10.1016/j.csl.2017.01.001_bib0035
  article-title: Sinc interpolation of nonuniform samples
  publication-title: IEEE Trans. Signal Process.
  doi: 10.1109/TSP.2011.2160054
– year: 2014
  ident: 10.1016/j.csl.2017.01.001_bib0001
  article-title: Anti-spoofing: voice databases
– year: 2015
  ident: 10.1016/j.csl.2017.01.001_bib0038
  article-title: STC anti-spoofing systems for the asvspoof 2015 challenge
– year: 1999
  ident: 10.1016/j.csl.2017.01.001_bib0032
  article-title: Vulnerability in speaker verification a study of technical impostor techniques
– year: 2016
  ident: 10.1016/j.csl.2017.01.001_bib0027
  article-title: Overview of BTAS 2016 speaker anti-spoofing competition
– volume: 105
  start-page: 1933
  issue: 3
  year: 1999
  ident: 10.1016/j.csl.2017.01.001_bib0005
  article-title: Computer identification of musical instruments using pattern recognition with cepstral coefficients as features
  publication-title: J. Acoust. Soc. Am.
  doi: 10.1121/1.426728
– year: 2016
  ident: 10.1016/j.csl.2017.01.001_bib0025
  article-title: Utterance verification for text-dependent speaker recognition: a comparative assessment using the RedDots corpus
– volume: 93
  start-page: 429
  year: 1946
  ident: 10.1016/j.csl.2017.01.001_bib0019
  article-title: Theory of communication
  publication-title: J. Inst. Elect. Eng.
– volume: 1
  start-page: 17
  year: 2005
  ident: 10.1016/j.csl.2017.01.001_bib0042
  article-title: Voice forgery using ALISP: Indexation in a client memory
SSID ssj0006547
Score 2.6036599
Snippet •Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 516
SubjectTerms Automatic speaker verification
Cepstral analysis
Constant Q transform
Presentation attack detection
Spoofing countermeasures
Title Constant Q cepstral coefficients: A spoofing countermeasure for automatic speaker verification
URI https://dx.doi.org/10.1016/j.csl.2017.01.001
Volume 45
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB5KvejBR1Wsj5KDJ2Ftdjf78laKpSoURAs9uWTzkKq0RbdXf7uTbFYrogePuyTsMpnMfEm-fANwmjJfJEGhvUTJzDNXKz2eMd_TkdAZZ5jihFX7HMXDMbueRJMG9Ou7MIZW6WJ_FdNttHZvus6a3cV02r3D-WG2NFNEFOiZtpg1Y4nx8vP3L5qHKa5bIcnIM63rk03L8RJv5vTBT6xyp6sL8yM3reSbwTZsOqBIetW_7EBDzVqwVRdhIG5OtmBjRVFwFx76Fd4ryS0RamH3MYiYKysUYTgTF6RHcCWLLjV7JLZQBIbmap-QIH4lfFnOrYortlL8Gb-Evm7oRHYE92A8uLzvDz1XQsETaPfSk4HC9UQgNE00jWiBS-FMay6F8iUmcq6oplLyIBBhjEBQc8FxEvuM00JIHepwH5qz-UwdAElpKDIEMIUIfCZVnOowjbK4CLURrde6DbQ2Xi6cvrgpc_GS10SypxztnRt759Q3ZLo2nH12WVTiGn81ZvWI5N88JMfg_3u3w_91O4J181SxyY6hWb4u1QnCj7LoWP_qwFrv6mY4-gCZatsE
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT8IwFH8hcFAPfqBG_OzBk8lC9715I0QCgiRGSDi5dF1rUDOIjv_f164jGKMHr1tftry-j1_b198DuI48m4dOKq1QZLGlrlZaLPZsS_pcxszDFMc12-c46E-9-5k_q0G3ugujyipN7C9juo7W5knbaLO9nM_bT-gfakszQkSBlqmaWTcUO5Vfh0ZnMOyP1wFZ9dctwaRvKYHqcFOXefFPdQBhh5q807SG-ZGeNlJObx92DVYknfJ3DqAm8ibsVX0YiHHLJuxskAoewnO3hHwFeSRcLPVWBuELobkiVNnELekQXMyiVeUvRPeKwOhcbhUShLCErYqFJnLFUYK94ZfQ3FVFkZ7EI5j27ibdvmW6KFgcVV9YmSNwSeFwSUNJfZriajiWkmVc2BnmciaopFnGHIe7AWJByThDP7Y9RlOeSVe6x1DPF7k4ARJRl8eIYVLu2F4mgki6kR8HqSsVb72ULaCV8hJuKMZVp4v3pKole01Q34nSd0JtVU_Xgpu1yLLk1_hrsFfNSPLNSBKM_7-Lnf5P7Aq2-pOHUTIajIdnsK3elMVl51AvPlbiAtFIkV4aa_sCI0vdtQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Constant+Q+cepstral+coefficients%3A+A+spoofing+countermeasure+for+automatic+speaker+verification&rft.jtitle=Computer+speech+%26+language&rft.au=Todisco%2C+Massimiliano&rft.au=Delgado%2C+H%C3%A9ctor&rft.au=Evans%2C+Nicholas&rft.date=2017-09-01&rft.issn=0885-2308&rft.volume=45&rft.spage=516&rft.epage=535&rft_id=info:doi/10.1016%2Fj.csl.2017.01.001&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_csl_2017_01_001
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0885-2308&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0885-2308&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0885-2308&client=summon