[1] ZHU D L, MA B, LI H Z. Speaker verification with feature-space MAPLR parameters[J]. IEEE Transactions on Audio Speech and Language Processing, 2011, 19(3):505-515. [2] WU Z Z, KINNUNEN T, EVANS N, et al. ASVspoof 2015:the first automatic speaker verification spoofing and countermeasures challenge[EB/OL].[2017-10-16]. http://www.zhizheng.org/papers/is2015_asvspoof.pdf. [3] ALEGRE F, JANICKI A, EVANS N. Re-assessing the threat of replay spoofing attacks against automatic speaker verification[C]//Proceedings of the 2014 International Conference of the Biometrics Special Interest Group. Piscataway, NJ:IEEE, 2014:157-168. [4] 张利鹏,曹犟,徐明星,等.防止假冒者闯入说话人识别系统[J].清华大学学报(自然科学版),2008,48(S1):699-703.(ZHANG L P, CAO J, XU M X, et al. Prevention of impostors entering speaker recognition systems[J]. Journal of Tsinghua University (Science and Technology), 2008, 48(S1):699-703.) [5] 王志峰,贺前华,张雪源,等.基于信道模式噪声的录音回放攻击检测[J].华南理工大学学报(自然科学版),2011,39(10):7-12.(WANG Z F, HE Q H, ZHANG X Y, et al. Playback attack detection based on channel pattern noise[J]. Journal of South China University of Technology (Natural Science Edition), 2011, 39(10):7-12.) [6] SHANG W, STEVENSON M. A playback attack detector for speaker verification systems [C]// Proceedings of the 20083rd International Symposium on Communications, Control and Signal Processing. Piscataway, NJ: IEEE, 2008: 1144-1149. [7] GAKA J, GRZYWACZ M, SAMBORSKI R. Playback attack detection for text-dependent speaker verification over telephone channels [J]. Speech Communication, 2015, 67: 143-153. [8] TODISCO M, DELGADO H, EVANS N. A new feature for automatic speaker verification anti-spoofing: constant Q cepstral coefficients [EB/OL]. [2017-10-16]. https://www.isca-speech.org/archive/Odyssey_2016/pdfs/59.pdf。 [9] BURILLO P, BUSTINCE H. Entropy on intuitionistic fuzzy sets and on interval-valued fuzzy sets [J]. Fuzzy Sets and Systems, 1996, 78(3): 305-316. [10] 项要杰,杨俊安,李晋徽,等.一种适用于说话人识别的改进Mel滤波器[J].计算机工程,2013,39(11):214-217,222.(XIANG Y J, YANG J A, LI J H, et al. An improved Mel-frequency filter for speaker recognition [J]. Computer Engineering, 2013, 39(11): 214-217, 222.) [11] WU Z Z, YAMAGISHI J, KINNUNEN T, et al. ASVspoof: the automatic speaker verification spoofing and countermeasures challenge [J]. IEEE Journal of Selected Topics in Signal Processing, 2017, 11(4): 588-604. [12] EVANS N W D, KINNUNEN T, YAMAGISHI J. Spoofing and countermeasures for automatic speaker verification [EB/OL]. [2017-10-16]. http://www.cstr.inf.ed.ac.uk/downloads/publications/2013/mm-publi-4018.pdf. [13] LEE K A, LARCHER A, WANG G S, et al. The RedDots data collection for speaker recognition [EB/OL]. [2017-10-16]. https://www.crim.ca/perso/patrick.kenny/kong_interspeech_2015.pdf. [14] KINNUNEN T, SAHIDULLAH M, FALCONE M, et al. RedDots replayed: a new replay spoofing attack corpus for text-dependent speaker verification research [C]// Proceedings of the 201742nd IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ: IEEE, 2017: 5395-5399. [15] WU Z Z, GAO S, CLING E S, et al. A study on replay attack and anti-spoofing for text-dependent speaker verification [EB/OL]. [2017-10-16]. http://www.zhizheng.org/papers/apsipa2014_replay.pdf. |