2016 IEEE Second International Conference on Multimedia Big Data (BigMM) 2016
DOI: 10.1109/bigmm.2016.14
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Learning Based Smartphone Playback Attack Detection Using GMM Supervector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…The earlier ones [24][25][26] were based on small-scale databases, where only a small number playback and recording conditions were taken into account. For example, in [24,27], three playback and recording devices were used to collect the database; in [25,28], one recording device and one playback device were used to create the database, which is named as authentic and playback speech database (APSD); in [29], the database was built by four smartphones; and in [26], four devices were used to create the playback utterances in the database, which is named as (audio-visual spoofing 2015) AVspoof 2015. Different from the above databases, the launch of the ASVspoof 2017 corpus provided a large common database, obtained using 26 playback devices, 25 recording devices, and 26 environments [1,2,30].…”
Section: Related Workmentioning
confidence: 99%
“…The earlier ones [24][25][26] were based on small-scale databases, where only a small number playback and recording conditions were taken into account. For example, in [24,27], three playback and recording devices were used to collect the database; in [25,28], one recording device and one playback device were used to create the database, which is named as authentic and playback speech database (APSD); in [29], the database was built by four smartphones; and in [26], four devices were used to create the playback utterances in the database, which is named as (audio-visual spoofing 2015) AVspoof 2015. Different from the above databases, the launch of the ASVspoof 2017 corpus provided a large common database, obtained using 26 playback devices, 25 recording devices, and 26 environments [1,2,30].…”
Section: Related Workmentioning
confidence: 99%
“…Although considered the easiest form of spoofing (e.g., no special expertise nor equipment is required [5]), to date only a few studies have addressed replay attacks when compared to other forms of spoofing. For example, in [6], the authors present a playback attack detector (PAD) based on a Gaussian mixture model (GMM) supervector (GSV) with a binary classifier based on a support vector machine (SVM). The authors in [7] rely on spectral bitmaps or spectral peaks, which are time-frequency points higher than a pre-defined threshold.…”
Section: Introductionmentioning
confidence: 99%
“…This type mainly utilizes a machine learning algorithm to learn the differences. An example is Wang et al's [14] use of a support vector machine [15] to learn the difference in Mel-frequency cepstral coefficient (MFCC)based acoustic features.…”
Section: Introductionmentioning
confidence: 99%