%Aigaion2 BibTeX export from Idiap Publications
%Monday 29 April 2024 12:26:24 PM

@TECHREPORT{Korshunov_Idiap-RR-24-2016,
         author = {Korshunov, Pavel and Marcel, S{\'{e}}bastien and Muckenhirn, Hannah and Gon{\c c}alves, A. R. and Mello, A. G. Souza and Violato, R. P. Velloso and Sim{\~{o}}es, Fl{\'{a}}vio and Uliani Neto, M{\'{a}}rio and de Assis Angeloni, Marcus and Stuchi, J. A. and Dinkel, H. and Chen, N. and Qian, Yanmin and Paul, D. and Saha, G. and Sahidullah, Md},
       projects = {Idiap, BEAT},
          month = {10},
          title = {Overview of BTAS 2016 Speaker Anti-spoofing Competition},
           type = {Idiap-RR},
         number = {Idiap-RR-24-2016},
           year = {2016},
    institution = {Idiap},
        address = {Niagara Falls, NY, USA},
           note = {Open source software for the paper: https://pypi.python.org/pypi/bob.paper.btas_c2016},
            url = {https://pypi.python.org/pypi/bob.paper.btas_c2016},
       abstract = {This paper provides an overview of the Speaker Anti-spoofing Competition organized by Biometric group at Idiap Research Institute for the IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2016). The competition used AVspoof database, which contains a comprehensive set of presentation attacks, including, (i) direct replay attacks when a genuine data is played back using a laptop and two phones (Samsung Galaxy S4 and iPhone 3G), (ii) synthesized speech replayed with a laptop, and (iii) speech created with a voice conversion algorithm, also replayed with a laptop. 
The paper states competition goals, describes the database and the evaluation protocol, discusses solutions for spoofing or presentation attack detection submitted by the participants, and presents the results of the evaluation.},
            pdf = {https://publications.idiap.ch/attachments/reports/2016/Korshunov_Idiap-RR-24-2016.pdf}
}