ReMASC: realistic replay attack corpus for voice controlled systems
Y Gong, J Yang, J Huber, M MacKnight… - arXiv preprint arXiv …, 2019 - arxiv.org
This paper introduces a new database of voice recordings with the goal of supporting
research on vulnerabilities and protection of voice-controlled systems (VCSs). In contrast to …
research on vulnerabilities and protection of voice-controlled systems (VCSs). In contrast to …
Periocular biometrics in mobile environment
T de Freitas Pereira, S Marcel - 2015 IEEE 7th International …, 2015 - ieeexplore.ieee.org
In this work we study periocular biometrics in a challenging scenario: a mobile environment,
where person recognition can take place on a mobile device. The proposed technique, that …
where person recognition can take place on a mobile device. The proposed technique, that …
On the use of convolutional neural networks for speech presentation attack detection
P Korshunov, AR Gonçalves… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
Research in the area of automatic speaker verification (ASV) has advanced enough for the
industry to start using ASV systems in practical applications. However, these systems are …
industry to start using ASV systems in practical applications. However, these systems are …
A cross-database study of voice presentation attack detection
P Korshunov, S Marcel - … of Biometric Anti-Spoofing: Presentation Attack …, 2019 - Springer
Despite an increasing interest in speaker recognition technologies, a significant obstacle still
hinders their wide deployment—their high vulnerability to spoofing or presentation attacks …
hinders their wide deployment—their high vulnerability to spoofing or presentation attacks …
The IJCB 2014 PaSC video face and person recognition competition
JR Beveridge, H Zhang, PJ Flynn, Y Lee… - … Joint Conference on …, 2014 - ieeexplore.ieee.org
The Point-and-Shoot Face Recognition Challenge (PaSC) is a performance evaluation
challenge including 1401 videos of 265 people acquired with handheld cameras and …
challenge including 1401 videos of 265 people acquired with handheld cameras and …
On the generalization of fused systems in voice presentation attack detection
AR Gonçalves, RPV Violato… - … conference of the …, 2017 - ieeexplore.ieee.org
This paper describes presentation attack detection systems developed for the Automatic
Speaker Verification Spoofing and Countermeasures Challenge (ASVspoof 2017). The …
Speaker Verification Spoofing and Countermeasures Challenge (ASVspoof 2017). The …
[PDF][PDF] Accelerating replay attack detector synthesis with loudspeaker characterization
AR Gonçalves, M Uliani Neto… - 7th symposium of …, 2015 - researchgate.net
An expensive step when building a machine learning-based replay attack detection system
is to obtain labeled data to train the classifier. The process to construct the spoofing audios …
is to obtain labeled data to train the classifier. The process to construct the spoofing audios …
[PDF][PDF] Aplicação da Correlação Espectral em Quadros de Áudio para
SV Bueno, JA Stuchi, RPV Violato, E Zaccaria - researchgate.net
Este artigo apresenta um estudo sobre atributos que podem ser explorados para a detecção
automática de atividade de voz em diferentes cenários de ruídos de fundo. O atributo …
automática de atividade de voz em diferentes cenários de ruídos de fundo. O atributo …
[PDF][PDF] The IJCB 2014 PaSC Video Face and Person Recognition Competition
JRBH Zhang, PJ Flynn, Y Lee, CPD Telecom… - ganghua.org
Abstract The Point-and-Shoot Face Recognition Challenge (PaSC) is a performance
evaluation challenge including 1401 videos of 265 people acquired with handheld cameras …
evaluation challenge including 1401 videos of 265 people acquired with handheld cameras …