Now showing items 1-4 of 4

    • ASVspoof 2019: A large-scale public database of synthetized, converted and replayed speech 

      Wang, Xin; Yamagishi, Junichi; Todisco, Massimiliano; Delgado, Héctor; Nautsch, Andreas; Evans, Nicholas; Sahidullah, Md; Vestman, Ville; Kinnunen, Tomi; Lee, Kong Aik; Juvela, Lauri; Alku, Paavo; Peng, Yu-Huai; Hwang, Hsin-Te; Tsao, Yu; Wang, Hsin-Min; Maguer, Sébastien Le; Becker, Markus; et al. (Elsevier BV, 2020)
      Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric person recognition. Unfortunately, just like all other biometric systems, ASV is vulnerable to spoofing, also referred to ...
      Tieteelliset aikakauslehtiartikkelit

    • Audiovisual Synchrony Detection with Optimized Audio Features 

      Sieranoja, Sami; Sahidullah, Md; Kinnunen, Tomi; Komulainen, Jukka; Hadid, Abdenour (IEEE, 2018)
      Audiovisual speech synchrony detection is an important part of talking-face verification systems. Prior work has primarily focused on visual features and joint-space models, while standard mel-frequency cepstral coefficients ...
      Artikkelit ja abstraktit tieteellisissä konferenssijulkaisuissa

    • Deep generative variational autoencoding for replay spoof detection in automatic speaker verification 

      Chettri, Bhusan; Kinnunen, Tomi; Benetos, Emmanouil (Elsevier BV, 2020)
      Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also called spoofing attacks. Replay is among the simplest attacks to mount — yet difficult to detect reliably. The generalization ...
      Tieteelliset aikakauslehtiartikkelit

    • Integrated Spoofing Countermeasures and Automatic Speaker Verification: an Evaluation on ASVspoof 2015 

      Sahidullah, Md; Delgado, Hector; Todisco, Massimiliano; Yu, Hong; Kinnunen, Tomi; Evans, Nicholas; Tan, Zheng-Hua (ISCA (the International Speech Communication Association), 2016)
      It is well known that automatic speaker verification (ASV) systems can be vulnerable to spoofing. The community has responded to the threat by developing dedicated countermeasures aimed at detecting spoofing attacks. ...
      conferenceObject