ReMASC: realistic replay attack corpus for voice controlled systems

Y Gong, J Yang, J Huber, M MacKnight… - arXiv preprint arXiv …, 2019 - arxiv.org
This paper introduces a new database of voice recordings with the goal of supporting
research on vulnerabilities and protection of voice-controlled systems (VCSs). In contrast to …

Periocular biometrics in mobile environment

T de Freitas Pereira, S Marcel - 2015 IEEE 7th International …, 2015 - ieeexplore.ieee.org
In this work we study periocular biometrics in a challenging scenario: a mobile environment,
where person recognition can take place on a mobile device. The proposed technique, that …

On the use of convolutional neural networks for speech presentation attack detection

P Korshunov, AR Gonçalves… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
Research in the area of automatic speaker verification (ASV) has advanced enough for the
industry to start using ASV systems in practical applications. However, these systems are …

A cross-database study of voice presentation attack detection

P Korshunov, S Marcel - … of Biometric Anti-Spoofing: Presentation Attack …, 2019 - Springer
Despite an increasing interest in speaker recognition technologies, a significant obstacle still
hinders their wide deployment—their high vulnerability to spoofing or presentation attacks …

The IJCB 2014 PaSC video face and person recognition competition

JR Beveridge, H Zhang, PJ Flynn, Y Lee… - … Joint Conference on …, 2014 - ieeexplore.ieee.org
The Point-and-Shoot Face Recognition Challenge (PaSC) is a performance evaluation
challenge including 1401 videos of 265 people acquired with handheld cameras and …

On the generalization of fused systems in voice presentation attack detection

AR Gonçalves, RPV Violato… - … conference of the …, 2017 - ieeexplore.ieee.org
This paper describes presentation attack detection systems developed for the Automatic
Speaker Verification Spoofing and Countermeasures Challenge (ASVspoof 2017). The …

[PDF][PDF] Accelerating replay attack detector synthesis with loudspeaker characterization

AR Gonçalves, M Uliani Neto… - 7th symposium of …, 2015 - researchgate.net
An expensive step when building a machine learning-based replay attack detection system
is to obtain labeled data to train the classifier. The process to construct the spoofing audios …

[PDF][PDF] Aplicação da Correlação Espectral em Quadros de Áudio para

SV Bueno, JA Stuchi, RPV Violato, E Zaccaria - researchgate.net
Este artigo apresenta um estudo sobre atributos que podem ser explorados para a detecção
automática de atividade de voz em diferentes cenários de ruídos de fundo. O atributo …

[PDF][PDF] The IJCB 2014 PaSC Video Face and Person Recognition Competition

JRBH Zhang, PJ Flynn, Y Lee, CPD Telecom… - ganghua.org
Abstract The Point-and-Shoot Face Recognition Challenge (PaSC) is a performance
evaluation challenge including 1401 videos of 265 people acquired with handheld cameras …