Author of the publication

An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks.

, , and . Secur. Commun. Networks, 9 (15): 3030-3044 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns., , and . BTAS, page 1-8. IEEE, (2013)Speaker Recognition Anti-spoofing., , , , , and . Handbook of Biometric Anti-Spoofing, Springer, (2014)On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals., , , and . EUSIPCO, page 36-40. IEEE, (2012)Evasion and obfuscation in speaker recognition surveillance and forensics., , , , and . IWBF, page 1-6. IEEE, (2014)An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks., , and . Secur. Commun. Networks, 9 (15): 3030-3044 (2016)Impact of Bandwidth and Channel Variation on Presentation Attack Detection for Speaker Verification., , , , , , , and . BIOSIG, volume P-270 of LNI, page 173-183. GI / IEEE, (2017)Re-assessing the threat of replay spoofing attacks against automatic speaker verification., , and . BIOSIG, volume P-230 of LNI, page 157-168. GI, (2014)Spoofing and countermeasures for speaker verification: A survey., , , , , and . Speech Commun., (2015)Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals., , and . INTERSPEECH, page 1688-1691. ISCA, (2012)Anti-spoofing, Voice Conversion., , , and . Encyclopedia of Biometrics, Springer US, (2015)