Biometric voice authentication auto-evaluation system
暂无分享,去创建一个
[1] Foster J. Provost,et al. ROC confidence bands: an empirical evaluation , 2005, ICML.
[2] Sofus A. Macskassy,et al. Pointwise ROC Confidence Bounds: An Empirical Evaluation , 2005 .
[3] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[4] Rabul Hussain Laskar,et al. Study on biometric authentication systems, challenges and future trends: A review , 2013 .
[5] John H. L. Hansen,et al. Getting started with SUSAS: a speech under simulated and actual stress database , 1997, EUROSPEECH.
[6] Jiankun Hu,et al. A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion , 2015, IEEE Transactions on Information Forensics and Security.
[7] Carlisle M. Adams,et al. You are the key: Generating cryptographic keys from voice biometrics , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[8] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[9] Dipak M. Adhyaru,et al. A survey of automated biometric authentication techniques , 2013, 2013 Nirma University International Conference on Engineering (NUiCONE).
[10] J. L. Wayman,et al. Best practices in testing and reporting performance of biometric devices. , 2002 .
[11] Carla Lopes,et al. Phone Recognition on the TIMIT Database , 2012 .
[12] Christoph Busch,et al. Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection , 2016, Odyssey.
[13] Saleh Mesbah,et al. Improving speaker identification system using discrete wavelet transform and AWGN , 2014, 2014 IEEE 5th International Conference on Software Engineering and Service Science.
[14] Chengwei Huang,et al. Speech Emotion Recognition under White Noise , 2013 .
[15] Daniel P. Lopresti,et al. Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices , 2002, USENIX Security Symposium.
[16] Arun Ross,et al. Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.
[17] Anil K. Jain,et al. Biometric Systems: Technology, Design and Performance Evaluation , 2004 .
[18] Michael K. Reiter,et al. Towards practical biometric key generation with randomized biometric templates , 2008, CCS.
[19] Daniel P. Lopresti,et al. Speech biometric mapping for key binding cryptosystem , 2011, Defense + Commercial Sensing.
[20] Tsuyoshi Isshiki,et al. Narrow Fingerprint Sensor Verification with Template Updating Technique , 2012, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[21] Jordi Solé i Casals,et al. Mathematical Morphology Preprocessing to Mitigate AWGN Effects: Improving Pitch Tracking Performance in Hard Noise Conditions , 2009, NOLISP.
[22] Foster J. Provost,et al. Confidence Bands for Roc Curves , 2004, ROCAI.
[23] Drottning Kristinas. DATABASES FOR SPEAKER RECOGNITION : ACTIVITIES IN COST 250 WORKING GROUP 2 , 1999 .