{"id":"https://openalex.org/W2890271448","doi":"https://doi.org/10.1109/wifs.2018.8630764","title":"Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems","display_name":"Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2890271448","doi":"https://doi.org/10.1109/wifs.2018.8630764","mag":"2890271448"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2018.8630764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2018.8630764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1809.04274","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012466506","display_name":"Fuming Fang","orcid":"https://orcid.org/0000-0002-9332-3735"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Fuming Fang","raw_affiliation_strings":["National Institute of Informatics, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Informatics, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007639385","display_name":"Junichi Yamagishi","orcid":"https://orcid.org/0000-0003-2752-3955"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Junichi Yamagishi","raw_affiliation_strings":["National Institute of Informatics, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Informatics, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044556342","display_name":"Isao Echizen","orcid":"https://orcid.org/0000-0003-4908-1860"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Isao Echizen","raw_affiliation_strings":["National Institute of Informatics, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Informatics, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079693142","display_name":"Md Sahidullah","orcid":"https://orcid.org/0000-0002-0624-2903"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Md Sahidullah","raw_affiliation_strings":["Inria, France"],"affiliations":[{"raw_affiliation_string":"Inria, France","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043168931","display_name":"Tomi Kinnunen","orcid":"https://orcid.org/0000-0002-4371-7322"},"institutions":[{"id":"https://openalex.org/I4210107997","display_name":"Finland University","ror":"https://ror.org/014rks409","country_code":"FI","type":"education","lineage":["https://openalex.org/I4210107997"]},{"id":"https://openalex.org/I175532246","display_name":"University of Eastern Finland","ror":"https://ror.org/00cyydd11","country_code":"FI","type":"education","lineage":["https://openalex.org/I175532246"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Tomi Kinnunen","raw_affiliation_strings":["University of Eastern Finland, Finland"],"affiliations":[{"raw_affiliation_string":"University of Eastern Finland, Finland","institution_ids":["https://openalex.org/I4210107997","https://openalex.org/I175532246"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012466506"],"corresponding_institution_ids":["https://openalex.org/I184597095"],"apc_list":null,"apc_paid":null,"fwci":1.19137475,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.82047346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"15","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.972599983215332,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7900145649909973},{"id":"https://openalex.org/keywords/speaker-verification","display_name":"Speaker verification","score":0.7709468007087708},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7194775342941284},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5578027367591858},{"id":"https://openalex.org/keywords/speaker-recognition","display_name":"Speaker recognition","score":0.265458881855011},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.204656183719635}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7900145649909973},{"id":"https://openalex.org/C2982762665","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker verification","level":3,"score":0.7709468007087708},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7194775342941284},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5578027367591858},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.265458881855011},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.204656183719635}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/wifs.2018.8630764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2018.8630764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1809.04274","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1809.04274","pdf_url":"https://arxiv.org/pdf/1809.04274","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null},{"id":"pmh:oai:pure.ed.ac.uk:openaire/cc70ba27-808a-4f4b-956c-f00a90f33500","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/cc70ba27-808a-4f4b-956c-f00a90f33500","pdf_url":null,"source":{"id":"https://openalex.org/S4306400321","display_name":"Edinburgh Research Explorer (University of Edinburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98677209","host_organization_name":"University of Edinburgh","host_organization_lineage":["https://openalex.org/I98677209"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fang, F, Yamagishi, J, Echizen, I, Sahidullah, M & Kinnunen, T 2019, Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems. in IEEE International Workshop on Information Forensics and Security (WIFS) 2018. Institute of Electrical and Electronics Engineers, Hong Kong, IEEE International Workshop on Information Forensics and Security 2018, Hong Kong, 11/12/18. https://doi.org/10.1109/WIFS.2018.8630764","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.ed.ac.uk:publications/cc70ba27-808a-4f4b-956c-f00a90f33500","is_oa":false,"landing_page_url":"https://ieeexplore.ieee.org/document/8630764","pdf_url":null,"source":{"id":"https://openalex.org/S4306400320","display_name":"Edinburgh Research Explorer (University of Edinburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98677209","host_organization_name":"University of Edinburgh","host_organization_lineage":["https://openalex.org/I98677209"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1809.04274","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1809.04274","pdf_url":"https://arxiv.org/pdf/1809.04274","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":63,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1533861849","https://openalex.org/W1604510059","https://openalex.org/W1638038541","https://openalex.org/W1688416049","https://openalex.org/W1799366690","https://openalex.org/W1936725236","https://openalex.org/W1980581462","https://openalex.org/W1996512145","https://openalex.org/W2008056655","https://openalex.org/W2041823554","https://openalex.org/W2049633694","https://openalex.org/W2083458151","https://openalex.org/W2095705004","https://openalex.org/W2099471712","https://openalex.org/W2123299109","https://openalex.org/W2125838338","https://openalex.org/W2150769028","https://openalex.org/W2176804518","https://openalex.org/W2271840356","https://openalex.org/W2303197844","https://openalex.org/W2398971481","https://openalex.org/W2432004435","https://openalex.org/W2508073351","https://openalex.org/W2508175215","https://openalex.org/W2527729766","https://openalex.org/W2564171085","https://openalex.org/W2591404214","https://openalex.org/W2600556233","https://openalex.org/W2745896134","https://openalex.org/W2747024632","https://openalex.org/W2757519008","https://openalex.org/W2791178280","https://openalex.org/W2797335731","https://openalex.org/W2799053639","https://openalex.org/W2805091617","https://openalex.org/W2806644022","https://openalex.org/W2807325376","https://openalex.org/W2807334339","https://openalex.org/W2963341071","https://openalex.org/W2963373786","https://openalex.org/W2964121744","https://openalex.org/W2964195110","https://openalex.org/W2981497094","https://openalex.org/W3100981705","https://openalex.org/W3126437110","https://openalex.org/W4253573210","https://openalex.org/W4320013936","https://openalex.org/W6631190155","https://openalex.org/W6631943919","https://openalex.org/W6635866963","https://openalex.org/W6638444622","https://openalex.org/W6674330103","https://openalex.org/W6685748340","https://openalex.org/W6694517276","https://openalex.org/W6696761078","https://openalex.org/W6697876165","https://openalex.org/W6712618806","https://openalex.org/W6718379498","https://openalex.org/W6731070234","https://openalex.org/W6742386808","https://openalex.org/W6750670189","https://openalex.org/W6752857352"],"related_works":["https://openalex.org/W4294437891","https://openalex.org/W4226389478","https://openalex.org/W4297792928","https://openalex.org/W4221161333","https://openalex.org/W3113108043","https://openalex.org/W2061278248","https://openalex.org/W4298202768","https://openalex.org/W1914348842","https://openalex.org/W2331222812","https://openalex.org/W2624476901"],"abstract_inverted_index":{"Automatic":[0],"speaker":[1,63],"verification":[2,15],"(ASV)":[3],"systems":[4],"use":[5,90,123],"a":[6,112,128],"playback":[7,11],"detector":[8],"to\\nfilter":[9],"out":[10],"attacks":[12],"and":[13],"ensure":[14],"reliability.":[16],"Since":[17],"current\\nplayback":[18],"detection":[19],"models":[20],"are":[21],"almost":[22],"always":[23],"trained":[24],"using":[25,73,77],"genuine":[26,49],"and\\nplayed-back":[27],"speech,":[28],"it":[29],"may":[30],"be":[31,145],"possible":[32],"to":[33,53,57,83,144],"degrade":[34],"their":[35],"performance":[36,126],"by\\ntransforming":[37],"the":[38,42,48,61,68,78,103,107,125],"acoustic":[39,85],"characteristics":[40],"of":[41,47,70,91,127,137],"played-back":[43],"speech":[44,59,79],"close":[45],"to\\nthat":[46],"speech.":[50],"One":[51],"way":[52],"do":[54],"this":[55,74,92],"is":[56,139],"enhance":[58],"\"stolen\"\\nfrom":[60],"target":[62],"before":[64],"playback.":[65],"We":[66],"tested":[67],"effectiveness":[69],"a\\nplayback":[71],"attack":[72,138],"method":[75,96],"by":[76],"enhancement":[80],"generative\\nadversarial":[81],"network":[82],"transform":[84],"characteristics.":[86],"Experimental":[87],"results\\nshowed":[88],"that":[89],"\"enhanced":[93],"stolen":[94],"speech\"":[95],"significantly":[97],"increases\\nthe":[98],"equal":[99],"error":[100],"rates":[101],"for":[102],"baseline":[104],"used":[105],"in":[106],"ASVspoof":[108],"2017":[109],"challenge":[110],"and\\nfor":[111],"light":[113],"convolutional":[114],"neural":[115],"network-based":[116],"method.":[117],"The":[118],"results":[119],"also":[120],"showed\\nthat":[121],"its":[122],"degrades":[124],"Gaussian":[129],"mixture":[130],"model-universal\\nbackground":[131],"model-based":[132],"ASV":[133],"system.":[134],"This":[135],"type":[136],"thus":[140],"an":[141],"urgent\\nproblem":[142],"needing":[143],"solved.\\n":[146]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3}],"updated_date":"2026-02-05T00:54:17.221276","created_date":"2025-10-10T00:00:00"}
