{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:14:11Z","timestamp":1740172451190,"version":"3.37.3"},"reference-count":78,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000266","name":"EPSRC","doi-asserted-by":"publisher","award":["EP\/I031022\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Speech Technology","award":["EP\/J002526\/1"]},{"name":"TUBITAK","award":["112E160"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Audio Speech Lang. Process."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/taslp.2016.2526653","type":"journal-article","created":{"date-parts":[[2016,2,8]],"date-time":"2016-02-08T19:13:33Z","timestamp":1454958813000},"page":"768-783","source":"Crossref","is-referenced-by-count":65,"title":["Anti-Spoofing for Text-Independent Speaker Verification: An Initial Database, Comparison of Countermeasures, and Human Performance"],"prefix":"10.1109","volume":"24","author":[{"given":"Zhizheng","family":"Wu","sequence":"first","affiliation":[]},{"given":"Phillip L.","family":"De Leon","sequence":"additional","affiliation":[]},{"given":"Cenk","family":"Demiroglu","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Khodabakhsh","sequence":"additional","affiliation":[]},{"given":"Simon","family":"King","sequence":"additional","affiliation":[]},{"given":"Zhen-Hua","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Daisuke","family":"Saito","sequence":"additional","affiliation":[]},{"given":"Bryan","family":"Stewart","sequence":"additional","affiliation":[]},{"given":"Tomoki","family":"Toda","sequence":"additional","affiliation":[]},{"given":"Mirjam","family":"Wester","sequence":"additional","affiliation":[]},{"given":"Junichi","family":"Yamagishi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2007.902870"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/E88-A.1.280"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511816338"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref76","article-title":"Approaching human listener accuracy with modern speaker verification","author":"hautam\u00e4ki","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref77","article-title":"Discontinuity detection in concatenated speech synthesis based on nonlinear speech analysis","author":"pantazis","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2013.2256895"},{"key":"ref39","article-title":"Introducing I-vectors for joint anti-spoofing and speaker verification","author":"khoury","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0356"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638222"},{"journal-title":"Spoofing and Anti-Spoofing (SAS) corpus v1 0","year":"2015","author":"wu","key":"ref78"},{"key":"ref33","article-title":"A new speaker verification spoofing countermeasure based on local binary patterns","author":"alegre","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.244"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639067"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854308"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398812"},{"key":"ref36","article-title":"A cross-vocoder study of speaker independent synthetic speech detection using phase information","author":"sanchez","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref35","article-title":"Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition","author":"wu","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712706"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2165944"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2006.881693"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TPAMI.2011.104","article-title":"Probabilistic models for inference about identity","volume":"34","author":"li","year":"2012","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref28","article-title":"A robust speaker verification system against imposture using an HMM-based speech synthesis system","author":"satoh","year":"0","journal-title":"Proc Eur Conf Speech Commun Technol (Eurospeech)"},{"key":"ref64","article-title":"AudioSeg: Audio segmentation toolkit, release 1.2","author":"gravier","year":"2010","journal-title":"IRIS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660175"},{"key":"ref65","article-title":"MSR identity toolbox v1. 0: A MATLAB toolbox for speaker recognition research","author":"sadjadi","year":"0","journal-title":"Proc IEEE Signal Process Soc Speech Lang Tech Committee Newsl"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2014.05.001"},{"key":"ref29","article-title":"Synthetic speech discrimination using pitch pattern statistics derived from image analysis","author":"de leon","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref67","article-title":"Usefulness of phase spectrum in human speech perception","author":"paliwal","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2006.876858"},{"key":"ref69","article-title":"Robustness of phase based features for speaker recognition","author":"rajan","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref2","article-title":"Human vs machine spoofing detection on wideband and narrowband data","author":"wester","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178810"},{"key":"ref20","article-title":"Voice transformation-based spoofing of text-dependent speaker verification systems","author":"kons","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref22","article-title":"On the security of HMM-based speaker verification systems against imposture using synthetic speech","author":"masuko","year":"0","journal-title":"Proc Eur Conf Speech Commun Technol (Eurospeech)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2014.17"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3115\/1075527.1075614"},{"key":"ref23","article-title":"Imposture using synthetic speech against speaker verification based on spectrum and pitch","author":"masuko","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415039"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1999.759801"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1992.225953"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495562"},{"key":"ref59","article-title":"Implementation of computationally efficient real-time voice conversion","author":"toda","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref58","article-title":"Exemplar-based unit selection for voice conversion utilizing temporal information","author":"wu","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2007.907344"},{"key":"ref56","article-title":"Effects of speaker adaptive training on tensor-based arbitrary speaker conversion","author":"saito","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6393(90)90011-W"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495139"},{"key":"ref53","article-title":"Mel-generalized cepstral analysis-a unified approach to speech spectral estimation","author":"tokuda","year":"0","journal-title":"Proc Int Conf Spoken Lang Process (ICSLP)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025708916924"},{"key":"ref10","article-title":"I-vectors meet imitators: On vulnerability of speaker verification systems against voice mimicry","author":"hautam\u00e4ki","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2015.05.002"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407362"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2011.6095943"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041636"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3080-9"},{"key":"ref15","article-title":"Evaluation of the vulnerability of speaker verification to synthetic speech","author":"de leon","year":"0","journal-title":"IEEE Odyssey Speaker and Language Recognition Workshop"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"ref17","article-title":"Artificial impostor voice transformation effects on false acceptance rates","author":"bonastre","year":"0","journal-title":"Proc INTERSPEECH"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288895"},{"key":"ref19","article-title":"A study on spoofing attack in state-of-the-art speaker verification: The telephone speech case","author":"wu","year":"0","journal-title":"Proc Asia-Pac Signal Inf Process Assoc Annu Summit Conf (APSIPA ASC)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(13)70036-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(12)70112-1"},{"key":"ref6","article-title":"Speaker verification makes its debut in smartphone","author":"lee","year":"0","journal-title":"Proc IEEE Signal Process Soc Speech Lang Tech Committee Newsl"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(13)70128-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2014.10.005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386915"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6393(90)90021-Z"},{"key":"ref9","article-title":"Vulnerability of speaker verification to voice mimicking","author":"lau","year":"0","journal-title":"Proc Int Symp Intell Multimedia Video Speech Process"},{"key":"ref46","article-title":"The CSTR\/EMIME HTS system for blizzard challenge 2010","author":"yamagishi","year":"0","journal-title":"Proc Blizzard Challenge"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6393(98)00085-5"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e90-d.5.816"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-013-0785-8"},{"key":"ref42","article-title":"ASVspoof 2015: The first automatic speaker verification spoofing and countermeasures challenge","author":"wu","year":"0","journal-title":"Proc INTERSPEECH"},{"year":"2014","author":"wu","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.04.004"},{"key":"ref43","article-title":"Human assisted speaker recognition in NIST SRE10","author":"greenberg","year":"0","journal-title":"IEEE Odyssey Speaker and Language Recognition Workshop"}],"container-title":["IEEE\/ACM Transactions on Audio, Speech, and Language Processing"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6570655\/7422174\/07400997.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570655\/7422174\/07400997.pdf?arnumber=7400997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:02:26Z","timestamp":1642003346000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7400997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":78,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/taslp.2016.2526653","relation":{},"ISSN":["2329-9290","2329-9304"],"issn-type":[{"type":"print","value":"2329-9290"},{"type":"electronic","value":"2329-9304"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}