[1] HANSEN J H L,HASAN T.Speaker recognition by machines and humans:a tutorial review[J].IEEE Signal Processing Magazine,2015,32(6):74-99. [2] HAUTAMÄKI R G,KINNUNEN T,HAUTAMÄKI V,et al.I-Vectors meet imitators:on vulnerability of speaker verification systems against voice mimicry[C]//Proceedings of IEEE Conference of the International Speech Communication Association.Washington D.C.,USA:IEEE Press,2013:930-934. [3] HE Qianhua,PAN Weiqiang,HU Yongjian,et al.Review on playback detection methods in speaker authentication system[J].Journal of Data Acquisition and Processing,2015,30(2):266-274.(in Chinese) 贺前华,潘伟锵,胡永健,等.说话人认证录音回放检测方法综述[J].数据采集与处理,2015,30(2):266-274. [4] DELEON P L,PUCHER M,YAMAGISHI J,et al.Evaluation of speaker verification security and detection of HMM-based synthetic speech[J].IEEE Transactions on Audio,Speech,and Language Processing,2012,20(8):2280-2290. [5] BONASTRE J F,MATROUF D,FREDOUILLE C.Artificial impostor voice transformation effects on false acceptance rates[C]//Proceedings of IEEE Conference of the International Speech Communication Association.Washington D.C.,USA:IEEE Press,2007:2053-2056. [6] SAHIDULLAH M,DELGADO H,TODISCO M,et al.Integrated spoofing countermeasures and automatic speaker verification:an evaluation on ASVspoof 2015[C]//Proceedings of IEEE Conference of the International Speech Communication Association.Washington D.C.,USA:IEEE Press,2016:1700-1704. [7] KINNUNEN T,SAHIDULLAH M,DELGADO H,et al.The ASVspoof 2017 challenge:assessing the limits of replay spoofing attack detection[C]//Proceedings of IEEE Conference of the International Speech Communication Association.Washington D.C.,USA:IEEE Press,2017:2-6. [8] XU Yongchao.Research on replay attack detection of automatic speaker verification by high frequency and bottleneck feature[D].Harbin:Harbin Institute of Technology,2018.(in Chinese)徐涌钞.基于高频和瓶颈特征的说话人验证系统重放攻击检测方法[D].哈尔滨:哈尔滨工业大学,2018. [9] JI Zhe,LI Zhiyi,LI Peng,et al.Ensemble learning for countermeasure of audio replay spoofing attack in ASVspoof 2017[C]//Proceedings of IEEE Conference of the International Speech Communication Association.Washington D.C.,USA:IEEE Press,2017:87-91. [10] REYNOLDS D A,QUATIERI T F,DUNN R B.Speaker verification using adapted Gaussian mixture models[J].Digital Signal Processing,2000,10(1/2/3):19-41. [11] JIANG Ye,TANG Zhenmin.Research on GMM text-independent speaker recognition[J].Computer Engineering and Applications,2010,46(11):179-182,195.(in Chinese)蒋晔,唐振民.GMM文本无关的说话人识别系统研究[J].计算机工程与应用,2010,46(11):179-182,195. [12] HUA Cheng,LI Hui.Speaker cerification based on supervector clustering with poor corpus[J].Journal of Data Acquisition and Processing,2014,29(2):238-242.(in Chinese)花城,李辉.小训练语料下基于均值超矢量聚类的说话人确认方法[J].数据采集与处理,2014,29(2):238-242. [13] BRVMMER N,DEVILLIERS E.The bosaris toolkit:theory,algorithms and code for surviving the new DCF[EB/OL].[2018-11-25].https://arxiv.org/pdf/1304.2865.pdf. [14] TODISCO M,DELGADO H,EVANS N.A new feature for automatic speaker verification anti-spoofing:constant Q cepstral coefficients[C]//Proceedings of Speaker and Language Recognition Workshop.Bilbao,Spain:[s.n.],2016:283-290. [15] TODISCO M,DELGADO H,EVANS N.Constant Q cepstral coefficients:a spoofing countermeasure for automatic speaker verification[J].Computer Speech and Language,2017,45:516-535. [16] HARRINGTON P.Machine learning practice[M].Translated by LI Rui.Beijing:Post and Telecommunica-tions Press,2013.(in Chinese) HARRINGTON P.机器学习实战[M].李锐,译.北京:人民邮电出版社,2013. [17] KINNUNEN T,SAHIDULLAH M,FALCONE M,et al.RedDots replayed:a new replay spoofing attack corpus for text-dependent speaker verification research[C]//Proceedings of IEEE International Conference on Acoustics,Speech and Signal Processing.Washington D.C.,USA:IEEE Press,2017:5395-5399. [18] HANILÇI C,KINNUNEN T,SAHIDULLAH M,et al.Classifiers for synthetic speech detection:a comparison[C]//Proceedings of IEEE Conference of the International Speech Communication Association.Washington D.C.,USA:IEEE Press,2015:2057-2061. [19] LI Peng,FU Yun,MOHAMMED U,et al.Probabilistic models for inference about identity[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2012,34(1):144-157. |