Identity Authentication Scheme Expansion Based on Speaker Verification
暂无分享,去创建一个
[1] S. Pruzansky. Pattern‐Matching Procedure for Automatic Talker Recognition , 1963 .
[2] Farzin Deravi,et al. A review of speech-based bimodal recognition , 2002, IEEE Trans. Multim..
[3] Peng Wu,et al. Identity Authentication and Key Agreement Integrated Key Management Protocol for Heterogeneous Sensor Networks , 2012, J. Comput..
[4] Richard Lippmann,et al. Review of Neural Networks for Speech Recognition , 1989, Neural Computation.
[5] Hervé Bourlard,et al. Hybrid HMM/ANN and GMM combination for user-customized password speaker verification , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[6] Til T. Phan,et al. Text-Independent Speaker Identification , 1999 .
[7] Richard P. Lippmann,et al. Review of Neural Networks for Speech Recognition , 1989, Neural Computation.
[8] H. Gish,et al. Text-independent speaker identification , 1994, IEEE Signal Processing Magazine.
[9] Michael N. Vrahatis,et al. Unified Particle Swarm Optimization in Dynamic Environments , 2005, EvoWorkshops.
[10] Yaming Wang,et al. Robust Text-independent Speaker Identification in a Time-varying Noisy Environment , 2012, J. Softw..