REFERENCES
Anjos, A ., Chakka, M. M., and Marcel, S. (2014). Motion-
based counter-measures to photo attacks in face recog-
nition. IET Biometrics, 3(3):147–158.
Chen, B., Liu, X., Zheng, Y., Zhao, G., and Shi, Y. (2022).
A robust gan-generated face detection method based
on dual-color spaces and an improved xception. IEEE
Trans. on Circuits and Systems for Video Technology,
32(6):3527–3538.
Cheng, P. and Roedig, U. (2022). Personal voice assistant
security and privacy — a survey. Proceedings of the
IEEE, 110(4):476–507.
Conotter, V., Bodnari, E., Boato, G., and Farid, H. (2014).
Physiologically-based detection of computer gener-
ated faces in video. In Proc. 21st IEEE Int’l Conf.
on Image Processing, pages 248–252.
Gafurov, D., Snekkenes, E., and Bours, P. (2007). Spoof
attacks on gait authentication system. IEEE Trans. on
Information Forensics and Security, 2(3):491–502.
Galbally, J. and Satta, R. (2015). Three-dimensional and
two-and-a-half-dimensional face recognition spoofing
using three-dimensional printed models. IET Biomet-
rics, 5(2):83–91.
Hadid, A. , Ghahramani, M., Bustard, J. , and Nixon, M.
(2013). Improving gait biometrics under spoofing at-
tacks. In Proc. 17th IAPR Int’l Conf. on Image Analy-
sis and Processing, pages 1–10.
Hadid, A., Ghahramani, M., Kellokumpu, V., Pi et ik¨ainen,
M., Bustard, J., and Nixon, M. (2012). Can gait bio-
metrics be spoofed? In P roc. 21st IAPR Int’l Conf. on
Pattern Recognition, pages 3280–3283.
He, Z., Wang, W., D ong, J., and Tan, T. (2020). Tempo-
ral sparse adversarial attack on sequence-based gait
recognition. arXiv:2002.09674.
Hirose, Y., Nakamura, K., Nitta, N., and Babaguchi, N.
(2019). Anonymization of gait silhouette video by
perturbing its phase and shape components. In Proc.
11th Asia-Pacific Signal and Information Processing
Association Annual Summit and Conference, pages
1679–1685.
Kammoun, A., Slama, R., Tabia, H., Ouni, T., and Abid,
M. (2022). Generative adversarial networks for face
generation: A survey. ACM Computing Surveys, page
37 pages.
Kreuk, F., Adi, Y., Cisse, M., and Keshet, J. (2018). Fooling
end-to-end speaker verification with adversarial ex-
amples. In Proc. 2018 IEEE Int’l Conf. on Acoustics,
Speech and Signal Processing, pages 1962–1966.
Kumar, S., Singh, S., and Kumar, J. (2017). A compar-
ative study on face spoofing attacks. In Proc. 2017
Int’l Conf. on Computing, Communication and Au-
tomation, pages 1104–1108.
Liu, L., Ling, Z., Jiang, Y., Zhou, M., and Dai, L. ( 2018).
Wavenet vocoder with limited t raining data for voice
conversion. In Proc. INTERSPEECH 2018, pages
1983–1987.
Makihara, Y., Mannami, H., Tsuji, A., Hossain, M. A., Sug-
iura, K., Mori, A., and Yagi, Y. (2012). The ou-isir gait
database comprising the treadmill dataset. IPSJ Trans.
on Computer Vision and Applications, 4:53–62.
Makihara, Y., Sagawa, R., Mukaigawa, Y., Echigo, T., and
Yagi, Y. (2006). Gait recognition using a view trans-
formation model in t he frequency domain. In Proc.
European C onf. on Computer Vision, pages 151–163.
Man, J. and Bhanu, B . (2006). Individual recognition using
gait energy image. IEEE Trans. on Pattern Analysis
and Machine Intelligence, 28(2):316–322.
Maqsood, M., Ghazanfar, M. A., Mehmood, I., Hwang,
E., and Rho, S. (2022). A meta-heuristic optimiza-
tion based less imperceptible adversarial attack on gait
based surveillance systems. Journal of Signal Pro-
cessing Systems, page 23 pages.
Nguyen, H., Nguyen-Son, H., Nguyen, T., and Echizen, I.
(2015). Discriminating between computer-generated
facial images and natural ones using smoothness prop-
erty and local entropy. In Proc. 14th Int’l Workshop
on Di git al Forensics and Watermarking, pages 39–50.
Nguyen, H. H., Yamagishi, J., Echizen, I., and Marcel,
S. (2020). Generating master faces for use in per-
forming wolf attacks on face recognition systems. In
Proc. 2020 IEEE Int’l Joint Conf. on Biometrics, page
10 pages.
Ohki, T., Hidano, S., and Takehisa, T. (2012). Evaluation
of wolf attack for classified target on speaker verifi-
cation systems. In Proc. 12th Int’l Conf. on Control
Automation Robotics and Vision, pages 182–187.
Patel, K., Han, H., and Jain, A. K. (2016). Secure face
unlock: Spoof detection on smartphones. IEEE Trans.
on Information Forensics and Security, 11(10):2268–
2283.
Shiota, S., Villavicencio, F., Yamagishi, J., Ono, N.,
Echizen, I. , and Matsui, T. (2015). Voice liveness
detection algorithms based on pop noise caused by
human breath for automatic speaker verification. In
Proc. of 16th Annual Conf. of the Int’l Speech Com-
munication Association, pages 239–243.
Toshpulatov, M., Lee, W., and Lee, S. (2021). Generative
adversarial networks and their application to 3d face
generation: A survey. Image and Vision Computing,
108:18 pages.
Tu, T., Chen, Y., Yeh, C., and Lee, H. (2019). End-to-end
text-to-speech for low-resource languages by cross-
lingual transfer learning. In Proc. INTERSPEE CH
2019, page 5 pages.
Une, M., Otsuka, A., and Imai, H. (2007). Wolf attack prob-
ability: A new security measure in biometric authen-
tication systems. In Proc. Int’l Conf. on Biometrics,
pages 396–406.
Wang, Q., Lin, X., Zhou, M., Chen, Y., Wang, C., Li,
Q., and Luo, X. (2019). Voicepop: A pop noise
based anti-spoofing system for voice authentication on
smartphones. In Proc. IEEE Conf. on Computer Com-
munications, pages 2062–2070.
Zhang, Y., Jiang, F., and Duan, Z. (2021). One-class learn-
ing towards synthetic voice spoofing detection. IEEE
Signal Processing Letters, 28:937–941.