2008 IEEE International Conference on Acoustics, Speech and Signal Processing 2008
DOI: 10.1109/icassp.2008.4518565
|View full text |Cite
|
Sign up to set email alerts
|

Some Results from the Biosecure Talking Face Evaluation Campaign

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…It fits a three‐component GMM to the log‐energy distribution and adjusts the speech/non‐speech threshold according to the GMM parameters . This approach has been used successfully in many independent studies, for example, .…”
Section: Methodsmentioning
confidence: 99%
“…It fits a three‐component GMM to the log‐energy distribution and adjusts the speech/non‐speech threshold according to the GMM parameters . This approach has been used successfully in many independent studies, for example, .…”
Section: Methodsmentioning
confidence: 99%
“…Most researches focus on the 2D spoofing attack [5][6][7][8][9][10][11][12][13][14][15][16][17][18].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the development of the face liveness detection system is necessary to improve the security of the system. The existing counter systems for 2D spoofing attacks can be classified in two categories: the user-cooperative systems [5][6][7][8][9] and the non-user-cooperative systems [10][11][12][13][14][15][16][17][18]. The user-cooperative systems require users to do specific tasks, e.g.…”
Section: Introductionmentioning
confidence: 99%
“…The speaker verification systems submitted by Swansea University and Validsoft are based on standard Gaussian Mixture Models (GMMs) [51], whose originality lies in the use of wide band feature extractors, an idea already explored by Swansea University during the Biosecure evaluation campaign [26]. They were developed using SPro 3 and ALIZE [9] open source toolkits.…”
Section: Swansea University and Validsoft (Suv)mentioning
confidence: 99%