Artur Janicki
Artur Janicki
Verified email at
Cited by
Cited by
Re-assessing the threat of replay spoofing attacks against automatic speaker verification
F Alegre, A Janicki, N Evans
2014 International Conference of the Biometrics Special Interest Group …, 2014
Steganalysis of transcoding steganography
A Janicki, W Mazurczyk, K Szczypiorski
annals of telecommunications-annales des télécommunications 69 (7-8), 449-460, 2014
Spoofing countermeasure based on analysis of linear prediction error
A Janicki
Sixteenth annual conference of the international speech communication …, 2015
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
A Janicki, F Alegre, N Evans
Security and Communication Networks 9 (15), 3030-3044, 2016
Speaker recognition from coded speech using support vector machines
A Janicki, T Staroszczyk
International Conference on Text, Speech and Dialogue, 291-298, 2011
Pitch‐based steganography for Speex voice codec
A Janicki
Security and communication networks 9 (15), 2923-2933, 2016
Comparison of speaker dependent and speaker independent emotion recognition
J Rybka, A Janicki
International Journal of Applied Mathematics and Computer Science 23 (4 …, 2013
" The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
K Szczypiorski, A Janicki, S Wendzel
arXiv preprint arXiv:1508.04978, 2015
YouSkyde: information hiding for Skype video traffic
W Mazurczyk, M Karaś, K Szczypiorski, A Janicki
Multimedia Tools and Applications 75 (21), 13521-13540, 2016
Recognition of extraversion level based on handwriting and support vector machines
Z Górska, A Janicki
Perceptual and Motor Skills 114 (3), 857-869, 2012
Influence of speech codecs selection on transcoding steganography
A Janicki, W Mazurczyk, K Szczypiorski
Telecommunication Systems 59 (3), 305-315, 2015
Non-linguistic vocalisation recognition based on hybrid GMM-SVM approach.
A Janicki
INTERSPEECH, 153-157, 2013
On the impact of non-speech sounds on speaker recognition
A Janicki
International Conference on Text, Speech and Dialogue, 566-572, 2012
Packet Loss Concealment Algorithm for VoIP Transmission in Unreliable Networks.
A Janicki, B Ksiezak
New Trends in Multimedia and Network Information Systems, 23-33, 2008
Automatic speech recognition for Polish in a computer game interface
A Janicki, D Wawer
2011 Federated Conference on Computer Science and Information Systems …, 2011
Novel method of hiding information in IP telephony using pitch approximation
A Janicki
2015 10th International Conference on Availability, Reliability and Security …, 2015
Prosody control in diphone-based speech synthesis system for Polish
S Kula, P Dymarski, A Janicki, C Jobin, PB de Mareuil
Prosody 2000 Workshop: Speech Recognition and Synthesis, Cracow, 135-142, 2000
Trends in modern information hiding: techniques, applications, and detection
W Mazurczyk, K Szczypiorski, A Janicki, H Tian
Security and Communication Networks 9 (8), 703-704, 2016
Traffic Fingerprinting Attacks on Internet of Things Using Machine Learning
M Skowron, A Janicki, W Mazurczyk
IEEE Access 8, 20386-20400, 2020
Voice-Driven Computer Game in Noisy Environments.
A Janicki, D Wawer
IJCSA 10 (1), 31-45, 2013
The system can't perform the operation now. Try again later.
Articles 1–20