Using a predefined passphrase to evaluate a speaker verification system
暂无分享,去创建一个
John V. Monaco | Charles C. Tappert | John Gibbons | Jonathan Leet | C. Tappert | J. Gibbons | Jonathan Leet
[1] Alvin F. Martin,et al. NIST 2008 speaker recognition evaluation: performance across telephone and room microphone channels , 2009, INTERSPEECH.
[2] James H. Martin,et al. Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition , 2000 .
[3] Virginia Teller. Review of Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition by Daniel Jurafsky and James H. Martin. Prentice Hall 2000. , 2000 .
[4] Giovanni Di Crescenzo,et al. Modeling cryptographic properties of voice and voice-based entity authentication , 2007, DIM '07.
[5] Andreas Stolcke,et al. Modeling prosodic feature sequences for speaker recognition , 2005, Speech Commun..
[6] Yong Gu,et al. An implementation and evaluation of an on-line speaker verification system for field trials , 1998, ICSLP.
[7] James H. Martin,et al. Speech and language processing: an introduction to natural language processing , 2000 .
[8] Roy A. Maxion. Making Experiments Dependable , 2011, Dependable and Historic Computing.
[9] Daniel Jurafsky,et al. Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition, 2nd Edition , 2009, Prentice Hall series in artificial intelligence.
[10] M. Wagner,et al. An Evaluation of "Commercial Off-The-Shelf" Speaker Verification Systems , 2006, 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop.
[11] Larry P. Heck,et al. Phonetic class-based speaker verification , 2003, INTERSPEECH.
[12] Luo Jun,et al. Spectral Subtraction Speech Enhancement Technology Based on Fast Noise Estimation , 2009, 2009 International Conference on Information Engineering and Computer Science.
[13] Bin Ma,et al. Text-dependent speaker verification: Classifiers, databases and RSR2015 , 2014, Speech Commun..
[14] Sung-Hyuk Cha,et al. Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input , 2013, 2013 European Intelligence and Security Informatics Conference.
[15] D. Reynolds. Automatic Speaker Recognition Using Gaussian Mixture Speaker Models , 1995 .
[16] Sebastian Möller,et al. On the need for different security methods on mobile phones , 2011, Mobile HCI.
[17] T. Kato,et al. Improved speaker, verification over the cellular phone network using phoneme-balanced and digit-sequence-preserving connected digit patterns , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..