[1] |
吴震东, 潘树诚, 章坚武 . 基于CNN的连续语音说话人声纹识别[J]. 电信科学, 2017,33(3): 59-66.
|
|
WU Z D , PAN S C , ZHANG J W . Continuous speech speaker recognition based on CNN[J]. Telecommunications Science, 2017,33(3): 59-66.
|
[2] |
WU Z Z , DE LEON P L , DEMIROGLU C ,et al. Anti-spoofing for text-independent speaker verification: an initial database,comparison of countermeasures,and human performance[J]. IEEE/ACM Transactions on Audio,Speech and Language Processing, 2016,24(4): 768-783.
|
[3] |
PHAPATANABURI K , WANG L B , NAKAGAWA S ,et al. Replay attack detection using linear prediction analysis-based relative phase features[J]. IEEE Access, 2019(7): 183614-183625.
|
[4] |
林朗, 王让定, 严迪群 ,等. 基于逆梅尔对数频谱系数的回放语音检测算法[J]. 电信科学, 2018,34(5): 90-98.
|
|
LIN L , WANG R D , YAN D Q ,et al. A playback speech detec-tion algorithm based on log inverse Mel-frequency spectral coefficient[J]. Telecommunications Science, 2018,34(5): 90-98.
|
[5] |
KHODABAKHSH A , MOHAMMADI A , DEMIROGLU C . Spoofing voice verification systems with statistical speech synthesis using limited adaptation data[J]. Computer Speech &Language, 2017(42): 20-37.
|
[6] |
WU Z Z , EVANS N , KINNUNEN T ,et al. Spoofing and countermeasures for speaker verification: a survey[J]. Speech Communication, 2015(66): 130-153.
|
[7] |
PAUL D , PAL M , SAHA G . Spectral features for synthetic speech detection[J]. IEEE Journal of Selected Topics in Signal Processing, 2017,11(4): 605-617.
|
[8] |
MUCKENHIRN H , KORSHUNOV P , MAGIMAI-DOSS M ,et al. Long-term spectral statistics for voice presentation attack detection[J]. IEEE/ACM Transactions on Audio,Speech and Language Processing, 2017,25(11): 2098-2111.
|
[9] |
MOWLAEE P , SAEIDI R , STYLIANOU Y . Advances in phase-aware signal processing in speech communication[J]. Speech Communication, 2016(81): 1-29.
|
[10] |
WANG L B , NAKAGAWA S , ZHANG Z F ,et al. Spoofing speech detection using modified relative phase information[J]. IEEE Journal of Selected Topics in Signal Processing, 2017,11(4): 660-670.
|
[11] |
HANILCI C , . Speaker verification anti-spoofing using linear prediction residual phase features[C]// Proceedings of 2017 25th European Signal Processing Conference (EUSIPCO).[S.l.:s.n.], 2017.
|
[12] |
OJALA T , PIETIKAINEN M , MAENPAA T . Multiresolution gray-scale and rotation invariant texture classification with local binary patterns[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002,24(7): 971-987.
|
[13] |
AHONEN T , HADID A , PIETIKAINEN M . Face description with local binary patterns: application to face recognition[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006,28(12): 2037-2041.
|
[14] |
ALEGRE F , VIPPERLA R , AMEHRAYE A ,et al. A new speaker verification spoofing countermeasure based on Local Binary Patterns[C]// Proceedings of 14th Annual Conference of the International Speech Communication Association (INTERSPEECH). Piscataway:IEEE Press, 2013.
|
[15] |
GUO Z H , ZHANG L , ZHANG D . A completed modeling of local binary pattern operator for texture classification[J]. IEEE Transactions on Image Processing, 2010,19(6): 1657-1663.
|
[16] |
CHANG C C , LIN C J . Libsvm[J]. ACM Transactions on Intelligent Systems and Technology, 2011,2(3): 1-27.
|
[17] |
WU Z Z , YAMAGISHI J , KINNUNEN T ,et al. ASVspoof: the automatic speaker verification spoofing and countermeasures challenge[J]. IEEE Journal of Selected Topics in Signal Processing, 2017,11(4): 588-604.
|
[18] |
徐剑 . 基于 CLBP 和 HOG 的伪装语音检测方法[D]. 杭州:杭州电子科技大学, 2020.
|
|
XU J . A method for detection of spoofing speech based on CLBP and HOG[D]. Hangzhou:Hangzhou Dianzi University, 2020.
|