M. Blomberg, D. Elenius, and E. Zetterholm, Speaker verification scores and acoustic analysis of a professional impersonator, Proc. FONETIK, 2004.

M. Farrús, M. Wagner, J. Anguita, and J. Hern, How vulnerable are prosodic features to professional imitators, Proc. Odyssey IEEE Workshop, 2008.

J. Lindberg and M. Blomberg, Vulnerability in speaker verification -a study of technical impostor techniques, European Conference on Speech Communication and Technology, pp.1211-1214, 1999.

J. Villalba and E. Lleida, Speaker verification performance degradation against spoofing and tampering attacks, FALA workshop, pp.131-134, 2010.

T. Masuko, T. Hitotsumatsu, K. Tokuda, and T. Kobayashi, On the security of HMM-based speaker verification systems against imposture using synthetic speech, Proc. EUROSPEECH, 1999.

P. De-leon, M. Pucher, and J. Yamagishi, Evaluation of the vulnerability of speaker verification to synthetic speech, Proc. Odyssey IEEE Workshop, 2010.

B. Pellom and J. Hansen, An experimental study of speaker verification sensitivity to computer voice-altered imposters, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258), pp.837-840, 1999.
DOI : 10.1109/ICASSP.1999.759801

P. Perrot, G. Aversano, R. Blouet, M. Charbit, and G. Chollet, Voice Forgery Using ALISP: Indexation in a Client Memory, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., pp.17-20, 2005.
DOI : 10.1109/ICASSP.2005.1415039

D. Matrouf, J. Bonastre, and J. Costa, Effect of impostor speech transformation on automatic speaker recognition, Biometrics on the Internet, p.37, 2005.

T. Kinnunen, Z. Wu, K. A. Lee, F. Sedlak, E. S. Chng et al., Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.4401-4404
DOI : 10.1109/ICASSP.2012.6288895

F. Alegre, R. Vipperla, N. Evans, and B. Fauve, On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals, Proc. 12th EUSIPCO, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00783812

J. Määttä, A. Hadid, and M. Pietikäinen, Face spoofing detection from single images using texture and local shape analysis, IET Biometrics, vol.1, issue.1, pp.3-10, 2012.
DOI : 10.1049/iet-bmt.2011.0009

M. Chakka, A. Anjos, S. Marcel, R. Tronci, D. Muntoni et al., Competition on counter measures to 2-D facial spoofing attacks, 2011 International Joint Conference on Biometrics (IJCB), pp.1-6, 2011.
DOI : 10.1109/IJCB.2011.6117509

Z. Wu, E. Chng, and H. Li, Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition, Proc. 13th Interspeech, 2012.

Z. Wu, T. Kinnunen, E. Chng, H. Li, and E. Ambikairajah, A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case, Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), p.2012

P. De-leon, I. Hernaez, I. Saratxaga, M. Pucher, and J. Yamagishi, Detection of synthetic speech for the problem of imposture, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.4844-4847, 2011.
DOI : 10.1109/ICASSP.2011.5947440

A. Ogihara and A. Shiozaki, Discrimination Method of Synthetic Speech Using Pitch Frequency against Synthetic Speech Falsification, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.88, issue.1, pp.280-286, 2005.
DOI : 10.1093/ietfec/E88-A.1.280

P. De-leon, B. Stewart, J. Yamagishi-]-t, M. Ojala, T. Pietikainen et al., Synthetic speech discrimination using pitch pattern statistics derived from image analysis Multiresolution grayscale and rotation invariant texture classification with local binary patterns, Proc. 13th Interspeech, pp.971-987, 2002.

T. Ahonen, A. Hadid, and M. Pietikainen, Face description with local binary patterns: Application to face recognition Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol.28, issue.12, pp.2037-2041, 2006.

F. Alegre, A. Amehraye, and N. Evans, Spoofing countermeasures to protect automatic speaker verification from voice conversion, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, p.2013
DOI : 10.1109/ICASSP.2013.6638222

URL : https://hal.archives-ouvertes.fr/hal-00804543

J. Bonastre, D. Matrouf, and C. Fredouille, Transfer functionbased voice transformation for speaker recognition, Proc. Odyssey IEEE Workshop, pp.1-6, 2006.
URL : https://hal.archives-ouvertes.fr/hal-01312979

J. Bonastre, D. Matrouf, and C. Fredouille, Artificial impostor voice transformation effects on false acceptance rates, Proc. Interspeech, pp.2053-2056, 2007.

J. Yamagishi, T. Nose, H. Zen, Z. Ling, T. Toda et al., Robust Speaker-Adaptive HMM-Based Text-to-Speech Synthesis, IEEE Transactions on Audio, Speech, and Language Processing, vol.17, issue.6, pp.1208-1230, 2009.
DOI : 10.1109/TASL.2009.2016394

J. Yamagishi, T. Kobayashi, Y. Nakano, K. Ogata, and J. Isogai, Analysis of Speaker Adaptation Algorithms for HMM-Based Speech Synthesis and a Constrained SMAPLR Adaptation Algorithm, IEEE Transactions on Audio, Speech, and Language Processing, vol.17, issue.1, pp.66-83, 2009.
DOI : 10.1109/TASL.2008.2006647

H. Kawahara, I. Masuda-katsuse, and A. De-cheveigné, Restructuring speech representations using a pitch-adaptive time???frequency smoothing and an instantaneous-frequency-based F0 extraction: Possible role of a repetitive structure in sounds, Speech Communication, vol.27, issue.3-4, pp.187-207, 1999.
DOI : 10.1016/S0167-6393(98)00085-5

URL : https://hal.archives-ouvertes.fr/hal-01105608

A. Roy, M. Magimai-doss, and S. Marcel, A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers, IEEE Transactions on Information Forensics and Security, vol.7, issue.1, pp.241-254, 2012.
DOI : 10.1109/TIFS.2011.2166387

D. Matrouf, N. Scheffer, B. Fauve, and J. Bonastre, A straightforward and efficient implementation of the factor analysis model for speaker verification, Proc. Interspeech, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01318480

W. Campbell, D. Sturim, D. Reynolds, and A. Solomonoff, SVM Based Speaker Verification using a GMM Supervector Kernel and NAP Variability Compensation, 2006 IEEE International Conference on Acoustics Speed and Signal Processing Proceedings, p.p. I, 2006.
DOI : 10.1109/ICASSP.2006.1659966

B. G. Fauve, D. Matrouf, N. Scheffer, J. Bonastre, and J. S. Mason, State-of-the-Art Performance in Text-Independent Speaker Verification Through Open-Source Software, IEEE Transactions on Audio, Speech and Language Processing, vol.15, issue.7, pp.1960-1968, 2007.
DOI : 10.1109/TASL.2007.902877

J. Bonastre, N. Scheffer, D. Matrouf, C. Fredouille, A. Larcher et al., Alize/spkdet: a state-of-the-art open source software for speaker recognition, Proc. Odyssey IEEE Workshop, p.1, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01312982

J. Bonastre, N. Scheffer, C. Fredouille, and D. Matrouf, NIST'04 speaker recognition evaluation campaign: new LIA speaker detection platform based on ALIZE toolkit, NIST SRE'04, 2004.

G. Gravier, Spro: speech signal processing toolkit Software available at http://gforge. inria, 2003.

F. Alegre, R. Vipperla, and N. Evans, Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals, Proc. 13th Interspeech, 2012.

M. Wester, The EMIME bilingual database, Tech. Rep, 2010.