Parameter Optimization in a Text-Dependent Cryptographic-Speech-Key Generation Task
暂无分享,去创建一个
[1] Rao Yarlagadda,et al. Features and measures for speaker recognition , 1992 .
[2] L. Paola García-Perera,et al. Cryptographic-Speech-Key Generation Architecture Improvements , 2005, IbPRIA.
[3] Federico Girosi,et al. Training support vector machines: an application to face detection , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[4] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] L. Paola García-Perera,et al. Cryptographic-Speech-Key Generation Using the SVM Technique over the lp-Cepstral Speech Space , 2004, Summer School on Neural Networks.
[6] Federico Girosi,et al. Support Vector Machines: Training and Applications , 1997 .
[7] L. Paola García-Perera,et al. SVM Applied to the Generation of Biometric Speech Key , 2004, CIARP.
[8] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[9] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[10] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[11] Biing-Hwang Juang,et al. Fundamentals of speech recognition , 1993, Prentice Hall signal processing series.
[12] Hsiao-Wuen Hon,et al. An overview of the SPHINX speech recognition system , 1990, IEEE Trans. Acoust. Speech Signal Process..
[13] L. Paola García-Perera,et al. Multi-speaker voice cryptographic key generation , 2005, The 3rd ACS/IEEE International Conference onComputer Systems and Applications, 2005..