2015
DOI: 10.48550/arxiv.1507.06711
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…Most of the successful spoofing countermeasures use Mel-frequency Cepstral Coefficients (MFCC) with their first and second derivatives as acoustic level features. They were used in [4], [7], [9], [10] and [11]. In [11] authors proposed Linear-frequency Cepstral Coefficients (LFCC) by using linear filterbank instead of mel-filterbank.…”
Section: Front-end Featuresmentioning
confidence: 99%
See 4 more Smart Citations
“…Most of the successful spoofing countermeasures use Mel-frequency Cepstral Coefficients (MFCC) with their first and second derivatives as acoustic level features. They were used in [4], [7], [9], [10] and [11]. In [11] authors proposed Linear-frequency Cepstral Coefficients (LFCC) by using linear filterbank instead of mel-filterbank.…”
Section: Front-end Featuresmentioning
confidence: 99%
“…MGD features are known as more stable in speach recognition and were mostly used by participants of the Challenge. They were implemented in spoofing detection systems in [6], [7], [8], [9] and [10]. However experiments from [6] presented in approach to solve the problem of GD were used by [7].…”
Section: Front-end Featuresmentioning
confidence: 99%
See 3 more Smart Citations