Algorithm to estimate biometric performance change over time
暂无分享,去创建一个
[1] J. Kittler,et al. Incorporating Variation of Model-specific Score Distribution in Speaker Verification Systems , 2007 .
[2] Patrick J. Flynn,et al. Experimental Evaluation of Eye Location Accuracies and Time-Lapse Effects on Face Recognition Systems , 2005, AVBPA.
[3] Matti Pietikäinen,et al. Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.
[4] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[5] Samy Bengio,et al. Why do multi-stream, multi-band and multi-modal approaches work on biometric user authentication tasks? , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[6] Bruce A. Draper,et al. Biometric zoos: Theory and experimental evidence , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[7] J. Pierrot. Elaboration et validation d'approches en verification du locuteur , 1998 .
[8] Patrick J. Flynn,et al. Assessment of Time Dependency in Face Recognition: An Initial Study , 2003, AVBPA.
[9] Julian Fiérrez,et al. Target dependent score normalization techniques and their application to signature verification , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[10] Josef Kittler,et al. On using error bounds to optimize cost-sensitive multimodal biometric authentication , 2008, 2008 19th International Conference on Pattern Recognition.
[11] Dominique Genoud,et al. Reconnaissance et transformation de locuteurs , 1999 .
[12] Josef Kittler,et al. Incorporating Model-Specific Score Distribution in Speaker Verification Systems , 2008, IEEE Transactions on Audio, Speech, and Language Processing.
[13] J. Kittler,et al. A methodology for separating sheep from goats for controlled enrollment and multimodal fusion , 2008, 2008 Biometrics Symposium.
[14] Neil Yager,et al. Worms, Chameleons, Phantoms and Doves: New Additions to the Biometric Menagerie , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.
[15] Roland Auckenthaler,et al. Score Normalization for Text-Independent Speaker Verification Systems , 2000, Digit. Signal Process..
[16] Douglas A. Reynolds,et al. SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .
[17] Hideki Imai,et al. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems , 2008, IEICE Trans. Inf. Syst..
[18] Elham Tabassi,et al. Performance of Biometric Quality Measures , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Josef Kittler,et al. On the Use of Log-Likelihood Ratio Based Model-Specific Score Normalisation in Biometric Authentication , 2007, ICB.
[20] Ke Chen,et al. Towards better making a decision in speaker verification , 2003, Pattern Recognit..
[21] Josef Kittler,et al. A Method for Estimating Authentication Performance over Time, with Applications to Face Biometrics , 2007, CIARP.
[22] Eric R. Ziegel,et al. The Elements of Statistical Learning , 2003, Technometrics.
[23] D. Cox,et al. An Analysis of Transformations , 1964 .
[24] Samy Bengio,et al. F-ratio client dependent normalisation for biometric authentication tasks , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[25] John Daugman,et al. Biometric decision landscapes , 2000 .
[26] Samy Bengio,et al. Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication , 2006, Pattern Recognit..
[27] Gian Luca Marcialis,et al. An Experimental Analysis of the Relationship between Biometric Template Update and the Doddington's Zoo: A Case Study in Face Verification , 2009, ICIAP.
[28] Patrick J. Flynn,et al. Empirical Studies of the Existence of the Biometric Menagerie in the FRGC 2.0 Color Image Corpus , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[29] Samy Bengio,et al. Client Dependent GMM-SVM Models for Speaker Verification , 2003, ICANN.
[30] John Daugman,et al. New Methods in Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[31] Sébastien Marcel,et al. Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS , 2003, AVBPA.
[32] S. Furui,et al. Cepstral analysis technique for automatic speaker verification , 1981 .
[33] Heekuck Oh,et al. Neural Networks for Pattern Recognition , 1993, Adv. Comput..
[34] Craig I. Watson,et al. The myth of goats :: how many people have fingerprints that are hard to match? , 2005 .
[35] Anil K. Jain,et al. Validating a Biometric Authentication System: Sample Size Requirements , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[36] Josef Kittler,et al. A multimodal biometric test bed for quality-dependent, cost-sensitive and client-specific score-level fusion algorithms , 2010, Pattern Recognit..
[37] Albert Ali Salah,et al. Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal Biometric Fusion Algorithms , 2009, IEEE Transactions on Information Forensics and Security.
[38] Javier Hernando,et al. On the use of score pruning in speaker verification for speaker dependent threshold estimation , 2004, Odyssey.