Artur Janicki
Artur Janicki
Verified email at
Cited by
Cited by
Re-assessing the threat of replay spoofing attacks against automatic speaker verification
F Alegre, A Janicki, N Evans
2014 International conference of the biometrics special interest group …, 2014
Steganalysis of transcoding steganography
A Janicki, W Mazurczyk, K Szczypiorski
annals of telecommunications-annales des télécommunications 69 (7), 449-460, 2014
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
A Janicki, F Alegre, N Evans
Security and Communication Networks 9 (15), 3030-3044, 2016
Spoofing countermeasure based on analysis of linear prediction error
A Janicki
Sixteenth annual conference of the international speech communication …, 2015
Pitch‐based steganography for Speex voice codec
A Janicki
Security and communication networks 9 (15), 2923-2933, 2016
" The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
K Szczypiorski, A Janicki, S Wendzel
arXiv preprint arXiv:1508.04978, 2015
Speaker recognition from coded speech using support vector machines
A Janicki, T Staroszczyk
International Conference on Text, Speech and Dialogue, 291-298, 2011
Comparison of speaker dependent and speaker independent emotion recognition
J Rybka, A Janicki
International Journal of Applied Mathematics and Computer Science 23 (4 …, 2013
YouSkyde: information hiding for Skype video traffic
W Mazurczyk, M Karaś, K Szczypiorski, A Janicki
Multimedia Tools and Applications 75 (21), 13521-13540, 2016
Recognition of extraversion level based on handwriting and support vector machines
Z Górska, A Janicki
Perceptual and motor skills 114 (3), 857-869, 2012
Influence of speech codecs selection on transcoding steganography
A Janicki, W Mazurczyk, K Szczypiorski
Telecommunication Systems 59 (3), 305-315, 2015
Non-linguistic vocalisation recognition based on hybrid GMM-SVM approach.
A Janicki
INTERSPEECH, 153-157, 2013
On the impact of non-speech sounds on speaker recognition
A Janicki
International Conference on Text, Speech and Dialogue, 566-572, 2012
Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks.
A Janicki, B Ksiezak
New Trends in Multimedia and Network Information Systems, 23-33, 2008
Novel method of hiding information in IP telephony using pitch approximation
A Janicki
2015 10th International Conference on Availability, Reliability and Security …, 2015
Automatic speech recognition for Polish in a computer game interface
A Janicki, D Wawer
2011 Federated Conference on Computer Science and Information Systems …, 2011
Trends in modern information hiding: techniques, applications, and detection
W Mazurczyk, K Szczypiorski, A Janicki, H Tian
Security and Communication Networks 9 (8), 703-704, 2016
SVM-based speaker verification for coded and uncoded speech
A Janicki
2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO …, 2012
Prosody control in diphone-based speech synthesis system for Polish
S Kula, P Dymarski, A Janicki, C Jobin, PB de Mareuil
Prosody 2000 Workshop: Speech Recognition and Synthesis, Cracow, 135-142, 2000
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
L Caviglione, M Choraś, I Corona, A Janicki, W Mazurczyk, M Pawlicki, ...
IEEE Access, 2020
The system can't perform the operation now. Try again later.
Articles 1–20