[1] |
KANERVISTO A , HAUTAM?KI V , KINNUNEN T ,et al. Optimizing tandem speaker verification and anti-spoofing systems[J]. IEEE/ACM Transactions on Audio,Speech,and Language Processing, 2022,30: 477-488.
|
[2] |
LEI Z C , YAN H , LIU C H ,et al. Two-path GMM-ResNet and GMM-SENet for ASV spoofing detection[C]// Proceedings of ICASSP 2022 - 2022 IEEE International Conference on Acoustics,Speech and Signal Processing. Piscataway:IEEE Press, 2022: 6377-6381.
|
[3] |
ALZANTOT M , WANG Z Q , SRIVASTAVA M B . Deep residual neural networks for audio spoofing detection[C]// Proceedings of Interspeech 2019. Cary:ISCA, 2019: 1078-1082.
|
[4] |
崔兆国 . 基于SVM的反蓄意模仿说话人识别研究[D]. 桂林:桂林电子科技大学, 2013.
|
|
CUI Z G . Research on speaker recognition of anti-deliberate imitation based on SVM[D]. Guilin:Guilin University of Electronic Technology, 2013.
|
[5] |
PADMANABHAN R , PARTHASARATHI S H K , MURTHY H A . Robustness of phase based features for speaker recognition[C]// Proceedings of Interspeech 2009. Cary:ISCA, 2009: 2299-2302.
|
[6] |
SARATXAGA I , SANCHEZ J , WU Z ,et al. Synthetic speech detection using phase information[J]. Speech Communication, 2016(81): 30-41.
|
[7] |
HOANG V T , . Unsupervised LBP histogram selection for color texture classification via sparse representation[C]// Proceedings of 2018 IEEE International Conference on Information Communication and Signal Processing. Piscataway:IEEE Press, 2018: 79-84.
|
[8] |
SHU X , SONG Z , SHI J ,et al. Multiple channels local binary pattern for color texture representation and classification[J]. Signal Processing:Image Communication, 2021(98): 116392.
|
[9] |
KARANWAL S . A comparative study of 14 state of art descriptors for face recognition[J]. Multimedia Tools and Applications, 2021,80(8): 12195-12234.
|
[10] |
SHI L , WANG X , SHEN Y . Research on 3D face recognition method based on LBP and SVM[J]. Optik:International Journal for Light and Electron Optics, 2020(220): 165157.
|
[11] |
ALEGRE F , VIPPERLA R , AMEHRAYE A ,et al. A new speaker verification spoofing countermeasure based on local binary patterns[C]// Proceedings of Interspeech 2013. Cary:ISCA, 2013: 940-944.
|
[12] |
徐剑, 简志华, 于佳祺 ,等. 采用完整局部二进制模式的伪装语音检测[J]. 电信科学, 2021,37(5): 91-99.
|
|
XU J , JIAN Z H , YU J Q ,et al. Completed local binary pattern based speech anti-spoofing[J]. Telecommunications Science, 2021,37(5): 91-99.
|
[13] |
XIA Z H , YUAN C S , LYU R ,et al. A novel weber local binary descriptor for fingerprint liveness detection[J]. IEEE Transactions on Systems,Man,and Cybernetics:Systems, 2018,50(4): 1526-1536.
|
[14] |
TOFFA O K , MIGNOTTE M . Environmental sound classification using local binary pattern and audio features collaboration[J]. IEEE Transactions on Multimedia, 2021(23): 3978-3985.
|
[15] |
SHAH A , EL-ALFY E , . Comparative analysis of feature extraction and fusion for blind authentication of digital images using chroma channels[J]. Signal Processing:Image Communication, 2021(95): 116271.
|
[16] |
王科俊, 曹逸, 邢向磊 . 基于MB-CSLBP的手指静脉加密算法研究[J]. 智能系统学报, 2018,13(4): 543-549.
|
|
WANG K J , CAO Y , XING X L . Finger-vein encryption algorithm based on MB-CSLBP[J]. CAAI Transactions on Intelligent Systems, 2018,13(4): 543-549.
|
[17] |
WANG X , YAMAGISHI J , TODISCO M ,et al. ASVspoof 2019:a large-scale public database of synthesized,converted and replayed speech[J]. Computer Speech & Language, 2020(64): 101114.
|
[18] |
KINNUNEN T , DELGADO H , EVANS N ,et al. Tandem assessment of spoofing countermeasures and automatic speaker verification:fundamentals[J]. IEEE/ACM Transactions on Audio,Speech,and Language Processing, 2020(28): 2195-2210.
|
[19] |
HEIKKILA M , PIETIKAINEN M . A texture-based method for modeling the background and detecting moving objects[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006,28(4): 657-662.
|
[20] |
LIU L J , LING Z H , JIANG Y ,et al. WaveNet vocoder with limited training data for voice conversion[C]// Proceedings of Annual Conference of the International Speech Communication Association (Interspeech). Cary:ISCA, 2018: 1983-1987.
|
[21] |
LI Y J , SWERSKY K , ZEMEL R . Generative moment matching networks[C]// Proceedings of International Conference on Machine Learning (ICML).[S.l.:s.n.], 2015: 1718-1727.
|