. Iso/iec, Information technologyBiometric presentation attack detection-Part 1: Framework, pp.30107-30108, 2016.

K. Nalini, J. Ratha, R. M. Connell, and . Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001.

A. C. Stephanie and . Schuckers, Spoofing and anti-spoofing measures, Information Security Technical Report, vol.7, issue.4, pp.56-62, 2002.

L. Ghiani, D. A. Yambay, V. Mura, G. L. Marcialis, F. Roli et al., Review of the fingerprint liveness detection (LivDet) competition series, Image and Vision Computing, vol.58, pp.110-128, 2009.

A. Murali-mohan-chakka, S. Anjos, R. Marcel, D. Tronci, G. Muntoni et al., Competition on counter measures to 2-D facial spoofing attacks, Int. Joint Conf. on Biometrics (IJCB), pp.1-6, 2011.

N. Evans, T. Kinnunen, and J. Yamagishi, Spoofing and countermeasures for automatic speaker verification, pp.925-929, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01880306

. Md, H. Sahidullah, M. Delgado, H. Todisco, T. Yu et al., Integrated spoofing countermeasures and automatic speaker verification: An evaluation on ASVspoof, pp.1700-1704, 2015.

N. Brümmer and J. Du-preez, Applicationindependent evaluation of speaker detection, Computer Speech & Language, vol.20, issue.2, pp.230-275, 2006.

G. R. Doddington, M. A. Przybocki, A. F. Martin, and D. A. Reynolds, The NIST speaker recognition evaluation-overview, methodology, systems, results, perspective, Speech Communication, vol.31, issue.2-3, pp.225-254, 2000.

A. Sizov, E. Khoury, T. Kinnunen, Z. Wu, and S. Marcel, Joint speaker verification and antispoofing in the i-vector space, IEEE Trans. Information Forensics and Security, vol.10, issue.4, pp.821-832, 2015.

N. Brümmer, Measuring, refining and calibrating speaker and language information extracted from speech, 2010.

Z. Wu, T. Kinnunen, N. Evans, J. Yamagishi, . Hanilçi et al., ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge, pp.2037-2041, 2015.

T. Kinnunen, . Md, H. Sahidullah, M. Delgado, N. Todisco et al., The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection, pp.2-6, 2017.

D. A. Reynolds, T. F. Quatieri, and R. B. Dunn, Speaker verification using adapted Gaussian mixture models, Digital Signal Processing, vol.10, issue.1-3, pp.19-41, 2000.