[1] |
SHANG W , STEVENSON M . A playback attack detector for speaker verification systems[C]// 2008 IEEE International Symposium on Communications Control and Signal Processing (ISCCSP),March 12-14,2008,Bordeaux,France. New Jersey:IEEE Press, 2008: 1144-1149.
|
[2] |
SHANG W , STEVENSON M . Score normalization in playback attack detection[C]// IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) ,March 14-19,2008,Dallas,USA. New Jersey:IEEE Press, 2010: 1678-1681.
|
[3] |
JAKUB G , MARCIN G , RAFAL S . Playback attack detection for text-dependent speaker verification over telephone channels[J]. Speech Communication, 2015(67): 143-153.
|
[4] |
WU Z , GAO S , CLING E S ,et al. A study on replay attack and anti-spoofing for text-dependent speaker verification[C]// IEEE 2014 Summit and Conference,Asia-Pacific Signal and Information Processing Association,December 9-12,2014,Siem Reap,Cambodia. New Jersey:IEEE Press, 2014: 35-45.
|
[5] |
张利鹏, 曹犟, 徐明星 . 防止假冒者闯入说话人识别系统[J]. 清华大学学报(自然科学版), 2008,48(S1): 699-703.
|
|
ZHANG L P , CAO J , XU M X . Prevention of impostors enter-ing speaker recognition systems[J]. Journal of Tsinghua univer-sity (Science and Technology ), 2008,48(S1): 699-703.
|
[6] |
王志锋, 贺前华, 张雪源 ,等. 基于模式噪声的录音回放攻击检测[J]. 华南理工大学学报, 2011,39(10): 7-12.
|
|
WANG Z F , HE Q H , ZHANG X Y ,et al. Channel pattern noise based playback detection algorithm speaker recognition[J]. Journal of South China University of Technology(Natural Science Edition), 2011,39(10): 7-12.
|
[7] |
WANG Z F , HE Q H , ZHANG X Y ,et al. Channel pattern noise based playback detection algorithm speaker recognition[C]// IEEE International Conference on Machine Learning and Cybernetics(ICMLC),July 10-13,2011,Guilin,China. New Jersey:IEEE Press, 2011: 1708-1713.
|
[8] |
VILLABA J , LLEIDA E . Detecting replay attacks from far-field recordings on speaker verification systems[C]// COST 2011 European Conference on Biometrics and ID Management,March 8-10,2011,Brandenburg,Germany. New York:ACM Press, 2011: 274-285.
|
[9] |
VILLABA J , LLEIDA E . Preventing replay attacks on speaker verification systems[C]// IEEE International Carnahan Conference on Security Technology (ICCST),October 18-21,2011,San Francisco,USA. New Jersey:IEEE Press, 2011: 1-8.
|
[10] |
CHEN Y N , WANG R D , YAN D Q ,et al. Voice playback detection based on long-window scale-factors[J]. International Journal of Security and Its Application, 2016,10(12): 299-310.
|
[11] |
郑志彬 . 信息网络安全威胁及技术发展趋势[J]. 电信科学, 2009,25(2): 28-34.
|
|
ZHENG Z B . Overview of mobile communication services se-curity[J]. Telecommunications Science, 2009,25(2): 28-34.
|
[12] |
王帅, 汪来富, 金华敏 ,等. 网络安全分析中的大数据技术应用[J]. 电信科学, 2015,31(7): 145-150.
|
|
WANG S , WANG L F , JIN H M ,et al. Big data application in network security analysis[J]. Telecommunications Science, 2015,31(7): 145-150.
|
[13] |
OPPENHERIM A V , LIM J S . The important of phase in signals[J]. Processing of the IEEE, 1981,69(5): 529-541.
|
[14] |
DUAN K B , RAJAPAKSE J C , WANG H Y ,et al. Multiple SVM-RFE for gene selection in cancer classification with expression data[J]. IEEE Transactions on Nano Bioscience, 2005,4(3): 228-234.
|
[15] |
王天庆, 李爱军. ,等.连续汉语语音识别语料库的设计[C]// 第六届全国现代语音学学术会议论文集(下),2003年10月18-20日,天津,中国. 天津:天津人民出版社, 2003.
|
|
WANG T Q , LI A J . The design of the continuous Chinese speech recognition corpus[C]// The sixth national conference on modern phonetics learning,October 18-20,2003,Tianjin,China,Tianjin:Tianjin Remin Chubanshe, 2003.
|
[16] |
杨震, 徐敏捷, 刘璋峰 ,等. 语音大数据信息处理架构及关键技术研究[J]. 电信科学, 2013,29(11): 1-5.
|
|
YANG Z , XU M J , LIU Z F ,et al. Study of audio frequency big data processing architecture and key technology[J]. Telecommunications Science, 2013,29(11): 1-5.
|
[17] |
CHAKROBORTY S , ROY A , SAHA G . Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks[J]. International Journal of Signal Processing, 2007,4(2): 114-122.
|
[18] |
KANAGASUNDARAM A , DEANA D , SRIDHARAN S ,et al. I-vector based speaker recognition using advanced channel compensation techniques[J]. Computer Speech and Language, 2014,28(1): 121-140.
|