Speaker verification scores and acoustic analysis of a professional impersonator, Proc. FONETIK, 2004. ,
How vulnerable are prosodic features to professional imitators, Proc. Odyssey IEEE Workshop, 2008. ,
Vulnerability in speaker verification -a study of technical impostor techniques, European Conference on Speech Communication and Technology, pp.1211-1214, 1999. ,
Speaker verification performance degradation against spoofing and tampering attacks, FALA workshop, pp.131-134, 2010. ,
On the security of HMM-based speaker verification systems against imposture using synthetic speech, Proc. EUROSPEECH, 1999. ,
Evaluation of the vulnerability of speaker verification to synthetic speech, Proc. Odyssey IEEE Workshop, 2010. ,
An experimental study of speaker verification sensitivity to computer voice-altered imposters, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258), pp.837-840, 1999. ,
DOI : 10.1109/ICASSP.1999.759801
Voice Forgery Using ALISP: Indexation in a Client Memory, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., pp.17-20, 2005. ,
DOI : 10.1109/ICASSP.2005.1415039
Effect of impostor speech transformation on automatic speaker recognition, Biometrics on the Internet, p.37, 2005. ,
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.4401-4404 ,
DOI : 10.1109/ICASSP.2012.6288895
On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals, Proc. 12th EUSIPCO, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00783812
Face spoofing detection from single images using texture and local shape analysis, IET Biometrics, vol.1, issue.1, pp.3-10, 2012. ,
DOI : 10.1049/iet-bmt.2011.0009
Competition on counter measures to 2-D facial spoofing attacks, 2011 International Joint Conference on Biometrics (IJCB), pp.1-6, 2011. ,
DOI : 10.1109/IJCB.2011.6117509
Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition, Proc. 13th Interspeech, 2012. ,
A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case, Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), p.2012 ,
Detection of synthetic speech for the problem of imposture, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.4844-4847, 2011. ,
DOI : 10.1109/ICASSP.2011.5947440
Discrimination Method of Synthetic Speech Using Pitch Frequency against Synthetic Speech Falsification, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.88, issue.1, pp.280-286, 2005. ,
DOI : 10.1093/ietfec/E88-A.1.280
Synthetic speech discrimination using pitch pattern statistics derived from image analysis Multiresolution grayscale and rotation invariant texture classification with local binary patterns, Proc. 13th Interspeech, pp.971-987, 2002. ,
Face description with local binary patterns: Application to face recognition Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol.28, issue.12, pp.2037-2041, 2006. ,
Spoofing countermeasures to protect automatic speaker verification from voice conversion, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, p.2013 ,
DOI : 10.1109/ICASSP.2013.6638222
URL : https://hal.archives-ouvertes.fr/hal-00804543
Transfer functionbased voice transformation for speaker recognition, Proc. Odyssey IEEE Workshop, pp.1-6, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-01312979
Artificial impostor voice transformation effects on false acceptance rates, Proc. Interspeech, pp.2053-2056, 2007. ,
Robust Speaker-Adaptive HMM-Based Text-to-Speech Synthesis, IEEE Transactions on Audio, Speech, and Language Processing, vol.17, issue.6, pp.1208-1230, 2009. ,
DOI : 10.1109/TASL.2009.2016394
Analysis of Speaker Adaptation Algorithms for HMM-Based Speech Synthesis and a Constrained SMAPLR Adaptation Algorithm, IEEE Transactions on Audio, Speech, and Language Processing, vol.17, issue.1, pp.66-83, 2009. ,
DOI : 10.1109/TASL.2008.2006647
Restructuring speech representations using a pitch-adaptive time???frequency smoothing and an instantaneous-frequency-based F0 extraction: Possible role of a repetitive structure in sounds, Speech Communication, vol.27, issue.3-4, pp.187-207, 1999. ,
DOI : 10.1016/S0167-6393(98)00085-5
URL : https://hal.archives-ouvertes.fr/hal-01105608
A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers, IEEE Transactions on Information Forensics and Security, vol.7, issue.1, pp.241-254, 2012. ,
DOI : 10.1109/TIFS.2011.2166387
A straightforward and efficient implementation of the factor analysis model for speaker verification, Proc. Interspeech, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-01318480
SVM Based Speaker Verification using a GMM Supervector Kernel and NAP Variability Compensation, 2006 IEEE International Conference on Acoustics Speed and Signal Processing Proceedings, p.p. I, 2006. ,
DOI : 10.1109/ICASSP.2006.1659966
State-of-the-Art Performance in Text-Independent Speaker Verification Through Open-Source Software, IEEE Transactions on Audio, Speech and Language Processing, vol.15, issue.7, pp.1960-1968, 2007. ,
DOI : 10.1109/TASL.2007.902877
Alize/spkdet: a state-of-the-art open source software for speaker recognition, Proc. Odyssey IEEE Workshop, p.1, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-01312982
NIST'04 speaker recognition evaluation campaign: new LIA speaker detection platform based on ALIZE toolkit, NIST SRE'04, 2004. ,
Spro: speech signal processing toolkit Software available at http://gforge. inria, 2003. ,
Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals, Proc. 13th Interspeech, 2012. ,
The EMIME bilingual database, Tech. Rep, 2010. ,