Telecommunications Science ›› 2017, Vol. 33 ›› Issue (8): 145-154.doi: 10.11959/j.issn.1000-0801.2017126
• research and development • Previous Articles Next Articles
Can LI,Rangding WANG(),Diqun YAN,Yanan CHEN
Revised:
2017-03-20
Online:
2017-08-01
Published:
2017-08-25
Supported by:
CLC Number:
Can LI,Rangding WANG,Diqun YAN,Yanan CHEN. Recapture voice replay detection based on phase spectrum[J]. Telecommunications Science, 2017, 33(8): 145-154.
[1] | SHANG W , STEVENSON M . A playback attack detector for speaker verification systems[C]// 2008 IEEE International Symposium on Communications Control and Signal Processing (ISCCSP),March 12-14,2008,Bordeaux,France. New Jersey:IEEE Press, 2008: 1144-1149. |
[2] | SHANG W , STEVENSON M . Score normalization in playback attack detection[C]// IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) ,March 14-19,2008,Dallas,USA. New Jersey:IEEE Press, 2010: 1678-1681. |
[3] | JAKUB G , MARCIN G , RAFAL S . Playback attack detection for text-dependent speaker verification over telephone channels[J]. Speech Communication, 2015(67): 143-153. |
[4] | WU Z , GAO S , CLING E S ,et al. A study on replay attack and anti-spoofing for text-dependent speaker verification[C]// IEEE 2014 Summit and Conference,Asia-Pacific Signal and Information Processing Association,December 9-12,2014,Siem Reap,Cambodia. New Jersey:IEEE Press, 2014: 35-45. |
[5] | 张利鹏, 曹犟, 徐明星 . 防止假冒者闯入说话人识别系统[J]. 清华大学学报(自然科学版), 2008,48(S1): 699-703. |
ZHANG L P , CAO J , XU M X . Prevention of impostors enter-ing speaker recognition systems[J]. Journal of Tsinghua univer-sity (Science and Technology ), 2008,48(S1): 699-703. | |
[6] | 王志锋, 贺前华, 张雪源 ,等. 基于模式噪声的录音回放攻击检测[J]. 华南理工大学学报, 2011,39(10): 7-12. |
WANG Z F , HE Q H , ZHANG X Y ,et al. Channel pattern noise based playback detection algorithm speaker recognition[J]. Journal of South China University of Technology(Natural Science Edition), 2011,39(10): 7-12. | |
[7] | WANG Z F , HE Q H , ZHANG X Y ,et al. Channel pattern noise based playback detection algorithm speaker recognition[C]// IEEE International Conference on Machine Learning and Cybernetics(ICMLC),July 10-13,2011,Guilin,China. New Jersey:IEEE Press, 2011: 1708-1713. |
[8] | VILLABA J , LLEIDA E . Detecting replay attacks from far-field recordings on speaker verification systems[C]// COST 2011 European Conference on Biometrics and ID Management,March 8-10,2011,Brandenburg,Germany. New York:ACM Press, 2011: 274-285. |
[9] | VILLABA J , LLEIDA E . Preventing replay attacks on speaker verification systems[C]// IEEE International Carnahan Conference on Security Technology (ICCST),October 18-21,2011,San Francisco,USA. New Jersey:IEEE Press, 2011: 1-8. |
[10] | CHEN Y N , WANG R D , YAN D Q ,et al. Voice playback detection based on long-window scale-factors[J]. International Journal of Security and Its Application, 2016,10(12): 299-310. |
[11] | 郑志彬 . 信息网络安全威胁及技术发展趋势[J]. 电信科学, 2009,25(2): 28-34. |
ZHENG Z B . Overview of mobile communication services se-curity[J]. Telecommunications Science, 2009,25(2): 28-34. | |
[12] | 王帅, 汪来富, 金华敏 ,等. 网络安全分析中的大数据技术应用[J]. 电信科学, 2015,31(7): 145-150. |
WANG S , WANG L F , JIN H M ,et al. Big data application in network security analysis[J]. Telecommunications Science, 2015,31(7): 145-150. | |
[13] | OPPENHERIM A V , LIM J S . The important of phase in signals[J]. Processing of the IEEE, 1981,69(5): 529-541. |
[14] | DUAN K B , RAJAPAKSE J C , WANG H Y ,et al. Multiple SVM-RFE for gene selection in cancer classification with expression data[J]. IEEE Transactions on Nano Bioscience, 2005,4(3): 228-234. |
[15] | 王天庆, 李爱军. ,等.连续汉语语音识别语料库的设计[C]// 第六届全国现代语音学学术会议论文集(下),2003年10月18-20日,天津,中国. 天津:天津人民出版社, 2003. |
WANG T Q , LI A J . The design of the continuous Chinese speech recognition corpus[C]// The sixth national conference on modern phonetics learning,October 18-20,2003,Tianjin,China,Tianjin:Tianjin Remin Chubanshe, 2003. | |
[16] | 杨震, 徐敏捷, 刘璋峰 ,等. 语音大数据信息处理架构及关键技术研究[J]. 电信科学, 2013,29(11): 1-5. |
YANG Z , XU M J , LIU Z F ,et al. Study of audio frequency big data processing architecture and key technology[J]. Telecommunications Science, 2013,29(11): 1-5. | |
[17] | CHAKROBORTY S , ROY A , SAHA G . Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks[J]. International Journal of Signal Processing, 2007,4(2): 114-122. |
[18] | KANAGASUNDARAM A , DEANA D , SRIDHARAN S ,et al. I-vector based speaker recognition using advanced channel compensation techniques[J]. Computer Speech and Language, 2014,28(1): 121-140. |
[1] | Honghui JIN, Zhihua JIAN, Man YANG, Chao WU. Synthetic speech detection method using texture feature based on circumferential local ternary pattern [J]. Telecommunications Science, 2023, 39(6): 85-95. |
[2] | Hui MA, Ruiqin WANG, Shuai YANG. A progressive growing of conditional generative adversarial networks model [J]. Telecommunications Science, 2023, 39(6): 105-113. |
[3] | Min LU, Juan HU, Xianchao ZHANG, Weijian DING, Guangxue YUE. Personalized recommendation model based on users multi-features fusion [J]. Telecommunications Science, 2023, 39(5): 101-115. |
[4] | Yong ZHANG, Jikui LIU, Wenlong KE. EEG emotion recognition based on parallel separable convolution and label smoothing regularization [J]. Telecommunications Science, 2023, 39(5): 116-128. |
[5] | Kun DENG, Qingfeng JIANG, Xingyan LIU. Community detection algorithm of hybrid node analysis and edge analysis in complex networks [J]. Telecommunications Science, 2023, 39(4): 87-100. |
[6] | Lijuan YE, Yiting WANG, Licheng ZHU. Cellular automata model based power network attack prediction technology [J]. Telecommunications Science, 2023, 39(4): 173-179. |
[7] | Yishi HAN, Yuxin XU, Tiantian LU. A model of RD-IHSAT rumor dissemination based on coupling network [J]. Telecommunications Science, 2023, 39(2): 118-131. |
[8] | Jia XU, Zhihua JIAN, Honghui JIN, Chao WU, Lin YOU, Yingxiao WU. Synthetic spoofing speech detection method based on center-symmetric local binary pattern [J]. Telecommunications Science, 2023, 39(1): 72-78. |
[9] | Huajian REN, Xiulan HAO, Wenjing XU. Deep learning Chinese input method with incremental vocabulary selection [J]. Telecommunications Science, 2022, 38(12): 56-64. |
[10] | Weina ZHOU, Lu LIU. A real-time detection method for multi-scale ships in complex scenes [J]. Telecommunications Science, 2022, 38(10): 67-78. |
[11] | Nan JIN, Ruiqin WANG, Yuecong LU. Ebbinghaus forgetting curve and attention mechanism based recommendation algorithm [J]. Telecommunications Science, 2022, 38(10): 89-97. |
[12] | Shuai YANG, Ruiqin WANG, Hui MA. Multi-channel based edge-learning graph convolutional network [J]. Telecommunications Science, 2022, 38(9): 95-104. |
[13] | Dongming ZHAO. Research and application practice of knowledge graph technology system for telecom-operators [J]. Telecommunications Science, 2022, 38(8): 151-162. |
[14] | Jiaqi YU, Zhihua JIAN, Jia XU, Lin YOU, Yunlu WANG, Chao WU. Spoofing speech detection algorithm based on joint feature and random forest [J]. Telecommunications Science, 2022, 38(6): 91-99. |
[15] | Qing SHEN, Wenbin GUO, Jungang LOU, Qiangguo YU. Personalized recommendation model with multi-level latent features [J]. Telecommunications Science, 2022, 38(2): 71-83. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|