Subband Analysis for Performance Improvement of Replay Attack Detection in Speaker Verification Systems
Citations
36 citations
10 citations
6 citations
5 citations
Cites background or methods from "Subband Analysis for Performance Im..."
...In the context of spoofing detection, the most relevant studies include [19, 20, 21, 22, 23, 24]....
[...]
...Our current work is different from prior works [19, 20, 21, 22, 23] because most of them aim at handcrafting or learning features [24] based on the relevance of specific subbands for spoofing detection....
[...]
...The authors of [21] similarly performed subband analysis using CQCC and MFCC features for replay spoofing detection on the ASVspoof 2017 dataset, with similar findings to those in [20]....
[...]
...Our proposed work is different from prior works [19, 20, 21, 22, 23] because most of them aim at hand-crafting or learning features [24] based on the relevance of specific subbands for spoofing detection....
[...]
1 citations
References
890 citations
"Subband Analysis for Performance Im..." refers methods in this paper
...CQCC features are computed using the constant-Q transform (CQT) [24], followed by uniform resampling and discrete cosine transform (DCT) [7]....
[...]
541 citations
"Subband Analysis for Performance Im..." refers background in this paper
...These attacks can be carried out at several points in the biometric processing pipeline [3]....
[...]
435 citations
433 citations
"Subband Analysis for Performance Im..." refers methods in this paper
...Further, the logarithm of energies followed by DCT operation is performed to compute the cepstral coefficients....
[...]
...They can be circumvented using the four methods namely, voice conversion, speech synthesis, voice mimicry and audio replay [7]....
[...]
...CQCC features are computed using the constant-Q transform (CQT) [24], followed by uniform resampling and discrete cosine transform (DCT) [7]....
[...]
371 citations