By Topic

IEEE Journal of Selected Topics in Signal Processing

Issue 4 • June 2017

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.

Filter Results

Displaying Results 1 - 22 of 22
  • Frontcover

    Publication Year: 2017, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (737 KB)
    Freely Available from IEEE
  • IEEE Journal of Selected Topics in Signal Processing publication information

    Publication Year: 2017, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2017, Page(s): B581
    Request permission for commercial reuse | PDF file iconPDF (2 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2017, Page(s): B582
    Request permission for commercial reuse | PDF file iconPDF (2 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2017, Page(s): 583
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2017, Page(s): B584
    Request permission for commercial reuse | PDF file iconPDF (2 KB)
    Freely Available from IEEE
  • Introduction to the Issue on Spoofing and Countermeasures for Automatic Speaker Verification

    Publication Year: 2017, Page(s):585 - 587
    Request permission for commercial reuse | PDF file iconPDF (263 KB) | HTML iconHTML
    Freely Available from IEEE
  • ASVspoof: The Automatic Speaker Verification Spoofing and Countermeasures Challenge

    Publication Year: 2017, Page(s):588 - 604
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1040 KB) | HTML iconHTML

    Concerns regarding the vulnerability of automatic speaker verification (ASV) technology against spoofing can undermine confidence in its reliability and form a barrier to exploitation. The absence of competitive evaluations and the lack of common datasets has hampered progress in developing effective spoofing countermeasures. This paper describes the ASV Spoofing and Countermeasures (ASVspoof) ini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spectral Features for Synthetic Speech Detection

    Publication Year: 2017, Page(s):605 - 617
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1509 KB) | HTML iconHTML

    Recent advancements in voice conversion (VC) and speech synthesis research make speech-based biometric systems highly prone to spoofing attacks. This can provoke an increase in false acceptance rate in such systems and requires countermeasure to mitigate such spoofing attacks. In this paper, we first study the characteristics of synthetic speech vis-à-vis natural speech and then propose a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cochlear Filter and Instantaneous Frequency Based Features for Spoofed Speech Detection

    Publication Year: 2017, Page(s):618 - 631
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1154 KB) | HTML iconHTML

    Vulnerability of voice biometrics systems to spoofing attacks by synthetic speech (SS) and voice converted (VC) speech has arose the need of standalone spoofed speech detection (SSD) systems. This paper is an extension of our previously proposed features (used in relatively best performing SSD system) at the first ASVspoof 2015 challenge held at INTERSPEECH 2015. For the challenge, the authors pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Front-End for Antispoofing Countermeasures in Speaker Verification: Scattering Spectral Decomposition

    Publication Year: 2017, Page(s):632 - 643
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1853 KB) | HTML iconHTML

    As speaker verification is widely used as a means of verifying personal identity in commercial applications, the study of antispoofing countermeasures has become increasingly important. By choosing appropriate spectral and prosodic feature mapping, spoofing methods based on voice conversion and speech synthesis are both capable of deceiving speaker verification systems that typically rely on these... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Significance of Source–Filter Interaction for Classification of Natural vs. Spoofed Speech

    Publication Year: 2017, Page(s):644 - 659
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3131 KB) | HTML iconHTML

    Countermeasures used to detect synthetic and voice-converted spoofed speech are usually based on excitation source or system features. However, in the natural speech production mechanism, there exists nonlinear source–filter (S–F) interaction as well. This interaction is an attribute of natural speech and is rarely present in synthetic or voice-converted speech. Therefore, we propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spoofing Speech Detection Using Modified Relative Phase Information

    Publication Year: 2017, Page(s):660 - 670
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (714 KB) | HTML iconHTML

    The detection of human and spoofing (synthetic or converted) speech has started to receive an increasing amount of attention. In this paper, modified relative phase (MRP) information extracted from a Fourier spectrum is proposed for spoofing speech detection. Because original phase information is almost entirely lost in spoofing speech using current synthesis or conversion techniques, some phase i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Postprocessing Synthetic Speech With a Complex Cepstrum Vocoder for Spoofing Phase-Based Synthetic Speech Detectors

    Publication Year: 2017, Page(s):671 - 683
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1402 KB) | HTML iconHTML

    State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs that exploit the fact that most of the parametric speech coders use minimum-phase filters are particularly successful when synthetic speech is generated with a parametric vocoder... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Investigation of Deep-Learning Frameworks for Speaker Verification Antispoofing

    Publication Year: 2017, Page(s):684 - 694
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1303 KB) | HTML iconHTML

    In this study, we explore the use of deep-learning approaches for spoofing detection in speaker verification. Most spoofing detection systems that have achieved recent success employ hand-craft features with specific spoofing prior knowledge, which may limit the feasibility to unseen spoofing attacks. We aim to investigate the genuine-spoofing discriminative ability from the back-end stage, utiliz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Score Fusion on Voice Biometrics and Presentation Attack Detection in Cross-Database Evaluations

    Publication Year: 2017, Page(s):695 - 705
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1940 KB) | HTML iconHTML

    Research in the area of automatic speaker verification (ASV) has been advanced enough for the industry to start using ASV systems in practical applications. However, these systems are highly vulnerable to spoofing or presentation attacks, limiting their wide deployment. Therefore, it is important to develop mechanisms that can detect such attacks, and it is equally important for these mechanisms t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Journal of Selected Topics in Signal Processing information for authors

    Publication Year: 2017, Page(s):706 - 707
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Introducing IEEE collabratec

    Publication Year: 2017, Page(s): 708
    Request permission for commercial reuse | PDF file iconPDF (1912 KB)
    Freely Available from IEEE
  • Become a published author in 4 to 6 weeks

    Publication Year: 2017, Page(s): 709
    Request permission for commercial reuse | PDF file iconPDF (790 KB)
    Freely Available from IEEE
  • Expand Your Network, Get Rewarded

    Publication Year: 2017, Page(s): 710
    Request permission for commercial reuse | PDF file iconPDF (1042 KB)
    Freely Available from IEEE
  • IEEE Signal Processing Society Information

    Publication Year: 2017, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Blank Page

    Publication Year: 2017, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (2 KB)
    Freely Available from IEEE

Aims & Scope

The Journal of Selected Topics in Signal Processing (J-STSP) solicits special issues on topics that cover the entire scope of the IEEE Signal Processing Society including the theory and application of filtering, coding, transmitting, estimating, detecting, analyzing, recognizing, synthesizing, recording, and reproducing signals by digital or analog devices or techniques.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Shrikanth (Shri) S. Narayanan
Viterbi School of Engineering 
University of Southern California
Los Angeles, CA 90089 USA
shri@sipi.usc.edu