{"id":"https://openalex.org/W3010704967","doi":"https://doi.org/10.1109/apsipaasc47483.2019.9023046","title":"Speech Demodulation-based Techniques for Replay and Presentation Attack Detection","display_name":"Speech Demodulation-based Techniques for Replay and Presentation Attack Detection","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3010704967","doi":"https://doi.org/10.1109/apsipaasc47483.2019.9023046","mag":"3010704967"},"language":"en","primary_location":{"id":"doi:10.1109/apsipaasc47483.2019.9023046","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc47483.2019.9023046","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075132642","display_name":"Madhu R. Kamble","orcid":"https://orcid.org/0000-0001-9006-7994"},"institutions":[{"id":"https://openalex.org/I98389781","display_name":"Dhirubhai Ambani Institute of Information and Communication Technology","ror":"https://ror.org/02d5b7g69","country_code":"IN","type":"education","lineage":["https://openalex.org/I98389781"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Madhu R. Kamble","raw_affiliation_strings":["Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), Gandhinagar, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), Gandhinagar, Gujarat, India","institution_ids":["https://openalex.org/I98389781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055157441","display_name":"Pulikonda Aditya Krishna Sai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100893","display_name":"Indian Institute of Information Technology Vadodara","ror":"https://ror.org/0163rt176","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210100893"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pulikonda Aditya Krishna Sai","raw_affiliation_strings":["Indian Institute of Information Technology (IIIT), Vadodara, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology (IIIT), Vadodara, Gujarat, India","institution_ids":["https://openalex.org/I4210100893"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012081448","display_name":"Maddala Venkata Siva Krishna","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100893","display_name":"Indian Institute of Information Technology Vadodara","ror":"https://ror.org/0163rt176","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210100893"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Maddala V. Siva Krishna","raw_affiliation_strings":["Indian Institute of Information Technology (IIIT), Vadodara, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology (IIIT), Vadodara, Gujarat, India","institution_ids":["https://openalex.org/I4210100893"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079352542","display_name":"Ankur T. Patil","orcid":"https://orcid.org/0000-0002-5666-272X"},"institutions":[{"id":"https://openalex.org/I98389781","display_name":"Dhirubhai Ambani Institute of Information and Communication Technology","ror":"https://ror.org/02d5b7g69","country_code":"IN","type":"education","lineage":["https://openalex.org/I98389781"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ankur T. Patil","raw_affiliation_strings":["Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), Gandhinagar, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), Gandhinagar, Gujarat, India","institution_ids":["https://openalex.org/I98389781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057075447","display_name":"Rajul Acharya","orcid":null},"institutions":[{"id":"https://openalex.org/I98389781","display_name":"Dhirubhai Ambani Institute of Information and Communication Technology","ror":"https://ror.org/02d5b7g69","country_code":"IN","type":"education","lineage":["https://openalex.org/I98389781"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajul Acharya","raw_affiliation_strings":["Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), Gandhinagar, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), Gandhinagar, Gujarat, India","institution_ids":["https://openalex.org/I98389781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043002276","display_name":"Hemant A. Patil","orcid":"https://orcid.org/0000-0002-4068-2005"},"institutions":[{"id":"https://openalex.org/I98389781","display_name":"Dhirubhai Ambani Institute of Information and Communication Technology","ror":"https://ror.org/02d5b7g69","country_code":"IN","type":"education","lineage":["https://openalex.org/I98389781"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Hemant A. Patil","raw_affiliation_strings":["Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), Gandhinagar, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT), Gandhinagar, Gujarat, India","institution_ids":["https://openalex.org/I98389781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5075132642"],"corresponding_institution_ids":["https://openalex.org/I98389781"],"apc_list":null,"apc_paid":null,"fwci":0.14,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60477158,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"38","issue":null,"first_page":"1545","last_page":"1550"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10863","display_name":"Voice and Speech Disorders","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2737","display_name":"Physiology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8240224123001099},{"id":"https://openalex.org/keywords/demodulation","display_name":"Demodulation","score":0.8116695880889893},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7538101673126221},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.6520183682441711},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6306862235069275},{"id":"https://openalex.org/keywords/word-error-rate","display_name":"Word error rate","score":0.5139705538749695},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5116387009620667},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32861340045928955},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.321402370929718},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11257416009902954},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.08890068531036377},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07527068257331848}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8240224123001099},{"id":"https://openalex.org/C195251586","wikidata":"https://www.wikidata.org/wiki/Q1185939","display_name":"Demodulation","level":3,"score":0.8116695880889893},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7538101673126221},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.6520183682441711},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6306862235069275},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.5139705538749695},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5116387009620667},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32861340045928955},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.321402370929718},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11257416009902954},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.08890068531036377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07527068257331848},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apsipaasc47483.2019.9023046","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc47483.2019.9023046","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5799999833106995,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W102301475","https://openalex.org/W1538482441","https://openalex.org/W1638038541","https://openalex.org/W1688416049","https://openalex.org/W1902957381","https://openalex.org/W1954900376","https://openalex.org/W1999016813","https://openalex.org/W2032038440","https://openalex.org/W2065711483","https://openalex.org/W2074953333","https://openalex.org/W2112606109","https://openalex.org/W2114537326","https://openalex.org/W2123299109","https://openalex.org/W2165880886","https://openalex.org/W2168677825","https://openalex.org/W2176804518","https://openalex.org/W2188563164","https://openalex.org/W2303197844","https://openalex.org/W2398971481","https://openalex.org/W2565961899","https://openalex.org/W2571201300","https://openalex.org/W2588445447","https://openalex.org/W2590129515","https://openalex.org/W2745744274","https://openalex.org/W2745896134","https://openalex.org/W2747024632","https://openalex.org/W2747182415","https://openalex.org/W2747419477","https://openalex.org/W2748644398","https://openalex.org/W2749187657","https://openalex.org/W2750335806","https://openalex.org/W2766090846","https://openalex.org/W2807325376","https://openalex.org/W2888980597","https://openalex.org/W2888992773","https://openalex.org/W2889084898","https://openalex.org/W2889450303","https://openalex.org/W2944450525","https://openalex.org/W6637209432","https://openalex.org/W6639641928","https://openalex.org/W6641014596","https://openalex.org/W6676842452","https://openalex.org/W6685748340","https://openalex.org/W6712618806","https://openalex.org/W6742386808","https://openalex.org/W6743346254","https://openalex.org/W6754440565"],"related_works":["https://openalex.org/W2794664665","https://openalex.org/W3007059209","https://openalex.org/W4220832730","https://openalex.org/W4313224733","https://openalex.org/W1688416049","https://openalex.org/W4312120756","https://openalex.org/W2972017669","https://openalex.org/W2783658022","https://openalex.org/W4288120931","https://openalex.org/W2624476901"],"abstract_inverted_index":{"Spoofing":[0],"is":[1,25,35,64],"one":[2],"of":[3,30,38,44,88,102],"the":[4,8,13,16,42,75,124,169,174,180,195],"threats":[5],"that":[6,121,156],"bypass":[7],"voice":[9],"biometrics":[10],"and":[11,58,83,114,126],"gains":[12],"access":[14],"to":[15,27,168],"system.":[17],"In":[18,73],"particular,":[19,74],"Automatic":[20],"Speaker":[21],"Verification":[22],"(ASV)":[23],"system":[24,192],"vulnerable":[26],"various":[28],"kinds":[29],"spoofing":[31],"attacks.":[32],"This":[33],"paper":[34],"an":[36],"extension":[37],"our":[39],"earlier":[40],"work,":[41],"combination":[43],"different":[45,134],"speech":[46,91,109],"demodulation":[47,104,135,181],"techniques,":[48],"such":[49],"as":[50],"Hilbert":[51],"Transform":[52],"(HT),":[53],"Energy":[54],"Separation":[55],"Algorithm":[56],"(ESA),":[57],"its":[59],"Variable":[60],"length":[61],"version":[62,117],"(VESA)":[63],"investigated":[65],"for":[66,176,193],"replay":[67,127],"Spoof":[68],"Speech":[69],"Detection":[70],"(SSD)":[71],"task.":[72,178],"feature":[76,183],"sets":[77,184],"are":[78],"developed":[79],"using":[80],"Instantaneous":[81,84],"Amplitude":[82],"Frequency":[85],"(IA-IF)":[86],"components":[87],"narrowband":[89],"filtered":[90],"signals":[92],"obtained":[93,132],"from":[94,133],"linearly-spaced":[95],"Gabor":[96],"filterbank.":[97],"We":[98],"observed":[99],"relative":[100],"effectiveness":[101],"these":[103],"techniques":[105,136],"on":[106,123,140,172],"two":[107],"spoof":[108],"databases,":[110],"i.e.,":[111],"BTAS":[112],"2016":[113],"ASVspoof":[115],"2017":[116],"2.0":[118],"challenge":[119],"database":[120],"focus":[122],"presentation":[125],"attacks,":[128],"respectively.":[129],"The":[130],"results":[131,139],"gave":[137,163,185],"comparable":[138],"both":[141,173,194],"databases":[142,175],"showing":[143],"small":[144],"variations":[145],"in":[146],"%":[147,187],"Equal":[148],"Error":[149],"Rate":[150],"(EER).":[151],"For":[152],"VESA,":[153],"we":[154],"found":[155],"with":[157],"Dependency":[158],"Index":[159],"(DI)":[160],"=":[161],"2":[162],"relatively":[164],"better":[165],"performance":[166],"compared":[167],"other":[170],"DI":[171],"SSD":[177],"All":[179],"technique-based":[182],"lower":[186],"EER":[188],"than":[189],"their":[190],"baseline":[191],"databases.":[196]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
