Sign in

Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks.

Vadim ShchemelininAlexander KozlovGalina LavrentyevaSergey NovoselovKonstantin Simonchik
Published in: SPECOM (2015)
Keyphrases
  • data mining
  • significant improvement
  • empirical studies
  • benchmark datasets
  • genetic algorithm
  • face recognition
  • countermeasures