Information technologyBiometric presentation attack detection-Part 1: Framework, pp.30107-30108, 2016. ,
Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001. ,
Spoofing and anti-spoofing measures, Information Security Technical Report, vol.7, issue.4, pp.56-62, 2002. ,
Review of the fingerprint liveness detection (LivDet) competition series, Image and Vision Computing, vol.58, pp.110-128, 2009. ,
Competition on counter measures to 2-D facial spoofing attacks, Int. Joint Conf. on Biometrics (IJCB), pp.1-6, 2011. ,
Spoofing and countermeasures for automatic speaker verification, pp.925-929, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01880306
Integrated spoofing countermeasures and automatic speaker verification: An evaluation on ASVspoof, pp.1700-1704, 2015. ,
Applicationindependent evaluation of speaker detection, Computer Speech & Language, vol.20, issue.2, pp.230-275, 2006. ,
The NIST speaker recognition evaluation-overview, methodology, systems, results, perspective, Speech Communication, vol.31, issue.2-3, pp.225-254, 2000. ,
Joint speaker verification and antispoofing in the i-vector space, IEEE Trans. Information Forensics and Security, vol.10, issue.4, pp.821-832, 2015. ,
Measuring, refining and calibrating speaker and language information extracted from speech, 2010. ,
ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge, pp.2037-2041, 2015. ,
The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection, pp.2-6, 2017. ,
Speaker verification using adapted Gaussian mixture models, Digital Signal Processing, vol.10, issue.1-3, pp.19-41, 2000. ,