Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001. ,
Information technology-biometric presentation attack detection-part 1: Framework, Online; accessed, vol.22, pp.30107-30108, 2016. ,
Spoofing and countermeasures for speaker verification: A survey, Speech Comm, vol.66, pp.130-153, 2015. ,
ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge, pp.2037-2041, 2015. ,
On the vulnerability of speaker verification to realistic voice spoofing, BTAS, pp.1-6, 2015. ,
Wild patterns: Ten years after the rise of adversarial machine learning, Pat. Rec, vol.84, pp.317-331, 2018. ,
The voice conversion challenge 2016, Proc. Interspeech, pp.1632-1636, 2016. ,
The voice conversion challenge 2018: Promoting development of parallel and nonparallel methods, Odyssey: the Speaker and Language Recognition Workshop, pp.195-202, 2018. ,
Automatic speaker verification using cepstral measurements, J. of the Acoustic Society of America, vol.46, issue.4, pp.1026-1032, 1969. ,
Voice spectrograms as a function of age, voice disguise, and voice imitation, J. of the Acoustical Society of America, vol.49, issue.6, pp.1842-1848, 1971. ,
Vulnerability of speaker verification to voice mimicking, Proc. Int. Symp on Intelligent Multimedia, Video & Speech Processing, pp.145-148, 2004. ,
Can a professional imitator fool a GMM-based speaker verification system?, IDIAP research report, pp.5-61, 2005. ,
The disguised voice: imitating accents or speech styles and impersonating individuals, vol.8, pp.86-96, 2010. ,
Automatic versus human speaker verification: The case of voice mimicry, Speech Comm, vol.72, pp.13-31, 2015. ,
Voice disguise in automatic speaker recognition, ACM Comput. Surv, vol.51, issue.4, p.22, 2018. ,
Can we steal your vocal identity from the internet? Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data, Odyssey: The Speaker and Language Recognition Workshop, pp.240-247, 2018. ,
Crowdsourcing attacks on biometric systems, Tenth Symposium on Usable Privacy and Security, pp.257-269, 2014. ,
VoxCeleb: A large-scale speaker identification dataset, pp.2616-2620, 2017. ,
VoxCeleb2: Deep speaker recognition, pp.1086-1090, 2018. ,
Practical black-box attacks against machine learning, Proc. ACM on Asia Conf. on Computer and Comm. Security, pp.506-519, 2017. ,
An overview of text-independent speaker recognition: From features to supervectors, Speech communication, vol.52, issue.1, pp.12-40, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00587602
Librispeech: An ASR corpus based on public domain audio books, Proc. ICASSP, pp.5206-5210, 2015. ,
Acoustical and perceptual study of voice disguise by age modification in speaker verification, Speech Comm, vol.95, pp.1-15, 2017. ,
X-vectors: Robust DNN embeddings for speaker recognition, Proc. ICASSP. IEEE, 2018. ,
The Kaldi Speech Recognition Toolkit, Proc. IEEE ASRU, 2011. ,