The most frequent way in which criminals disguise their voices implies changes in phonation types, but it is difficult to maintain them for a long time. This mechanism severely hampers identification. Currently, the CIVIL corpus comprises 60 Spanish speakers. Each subject performs three tasks: spontaneous conversation, carrier sentences and reading, using modal, falsetto and creak(y) phonation. Two different recording sessions, one month apart, were conducted for each speaker, who was recorded with microphone, telephone and electroglottography. This is the first (open-access) corpus of disguised voices in Spanish. Its main purpose is finding biometric traces that remain in voice despite disguiseTh...
This thesis is intended to analyze the implementation of the forensic method using voice recognition...
The aim of forensic speaker recognition is to establish links between individuals and criminal activ...
This chapter describes a number of signal-processing and statistical-modeling techniques that are co...
AbstractThe most frequent way in which criminals disguise their voices implies changes in phonation ...
This paper presents and describes Ahumada III, a speech database in Spanish collected from real fore...
Forensic voice comparison is one of the tasks of forensic phonetics that consists of matching dubiou...
Proceedings of Interspeech 2008, Brisbane (Australia)This paper presents and describes Ahumada III, ...
The purpose of this experiment was to use audio forensics to identify the voiceprint of an individua...
The aim of the VILE project is the acoustic phonetic analysis of inter and intra-speaker variation i...
Individuals in professions such as forensic science and criminal investigation are greatly intereste...
In this paper we analyze the advantages of using data mining techniques and tools for data fusion in...
Authorship attribution of speech, from environmental recordings and telephone interceptions, which c...
Forensic Speaker Recognition: Law Enforcement and Counter-Terrorism is an anthology of the research ...
Abstract. This article describes techniques of vocal forgery able to af-fect automatic speaker recog...
The paper deals with the main issues of foreign forensic phonetics in the mid 20th - early 21st cent...
This thesis is intended to analyze the implementation of the forensic method using voice recognition...
The aim of forensic speaker recognition is to establish links between individuals and criminal activ...
This chapter describes a number of signal-processing and statistical-modeling techniques that are co...
AbstractThe most frequent way in which criminals disguise their voices implies changes in phonation ...
This paper presents and describes Ahumada III, a speech database in Spanish collected from real fore...
Forensic voice comparison is one of the tasks of forensic phonetics that consists of matching dubiou...
Proceedings of Interspeech 2008, Brisbane (Australia)This paper presents and describes Ahumada III, ...
The purpose of this experiment was to use audio forensics to identify the voiceprint of an individua...
The aim of the VILE project is the acoustic phonetic analysis of inter and intra-speaker variation i...
Individuals in professions such as forensic science and criminal investigation are greatly intereste...
In this paper we analyze the advantages of using data mining techniques and tools for data fusion in...
Authorship attribution of speech, from environmental recordings and telephone interceptions, which c...
Forensic Speaker Recognition: Law Enforcement and Counter-Terrorism is an anthology of the research ...
Abstract. This article describes techniques of vocal forgery able to af-fect automatic speaker recog...
The paper deals with the main issues of foreign forensic phonetics in the mid 20th - early 21st cent...
This thesis is intended to analyze the implementation of the forensic method using voice recognition...
The aim of forensic speaker recognition is to establish links between individuals and criminal activ...
This chapter describes a number of signal-processing and statistical-modeling techniques that are co...