-
2
-
-
1942537182
-
Spoofing and Anti-Spoofing Measures
-
SAC. Schuckers, "Spoofing and Anti-Spoofing Measures", Information Security Technical Report, Vol. 7, No. 4, 2002, pp. 56-62
-
(2002)
Information Security Technical Report
, vol.7
, Issue.4
, pp. 56-62
-
-
Schuckers, S.A.C.1
-
3
-
-
8344226207
-
Issues for Liveness Detection in Biometrics
-
SAC. Schuckers, L. Hornak, T. Norman, R. Derakhshani, S. Parthasaradhi, S., "Issues for Liveness Detection in Biometrics", Abstract in the Proceedings of the Biometrics Consortium Conference, Arlington, VA, September 2002
-
Abstract in the Proceedings of the Biometrics Consortium Conference, Arlington, VA, September 2002
-
-
Schuckers, S.A.C.1
Hornak, L.2
Norman, T.3
Derakhshani, R.4
Parthasaradhi, S.S.5
-
4
-
-
77952721098
-
-
Spoof Draft 1', International Biometric Group
-
Spoof 2007, High-Level Test Plan, Draft 1', International Biometric Group
-
(2007)
High-Level Test Plan
-
-
-
6
-
-
0036293830
-
An overview of automatic speaker recognition technology
-
D.A. Reynolds, "An overview of automatic speaker recognition technology", Proc. ICASSP 2002, pp. 4072-4075
-
Proc. ICASSP 2002
, pp. 4072-4075
-
-
Reynolds, D.A.1
-
7
-
-
70449821531
-
Under Attack: Common Criteria has loads of critics, but is it getting a bum rap
-
retrieved 12-14
-
W. Jackson, "Under Attack: Common Criteria has loads of critics, but is it getting a bum rap", Government Computer News, retrieved 2007-12-14
-
(2007)
Government Computer News
-
-
Jackson, W.1
-
8
-
-
0008362168
-
Can We Make Crime Prevention Adaptive by Learning from Other Evolutionary Struggles?
-
1999
-
Ekblom, P. , 1999,"Can We Make Crime Prevention Adaptive by Learning from Other Evolutionary Struggles?", Studies on Crime and Crime Prevention, 1999, Vol. 8 No.1, pp. 27-51
-
(1999)
Studies on Crime and Crime Prevention
, vol.8
, Issue.1
, pp. 27-51
-
-
Ekblom, P.1
-
10
-
-
30944461964
-
Biometric Standards-An Update
-
January
-
"Biometric Standards-An Update", Biometric Technology Today Journal, January 2006
-
(2006)
Biometric Technology Today Journal
-
-
-
14
-
-
85135261394
-
Vulnerability in speaker verification - A study of technical impostor techniques
-
J. Lindberg, M. Blomberg, "Vulnerability in speaker verification - a study of technical impostor techniques", Proceeding of EUROSPEECH 1999, Budapest, Hungary, pp. 1211-1214
-
Proceeding of EUROSPEECH 1999, Budapest, Hungary
, pp. 1211-1214
-
-
Lindberg, J.1
Blomberg, M.2
-
15
-
-
77952687282
-
On the Security of HMM Based Speaker Verification Against Imposture Using Speech Synthesis
-
T. Masuko, T. Hitotsumatsu, K. Tokuda, T. Kobayashi, "On the Security of HMM Based Speaker Verification Against Imposture Using Speech Synthesis", Eurospeech Conference, 1999, Budapest
-
Eurospeech Conference, 1999, Budapest
-
-
Masuko, T.1
Hitotsumatsu, T.2
Tokuda, K.3
Kobayashi, T.4
-
16
-
-
85009077529
-
Imposture using synthetic speech against speaker verification based on spectrum and pitch
-
T. Masuko, K. Tokuda, T. Kobayashi, "Imposture using synthetic speech against speaker verification based on spectrum and pitch", In ICSLP-2000, vol.2, 2000, pp. 302-305
-
(2000)
ICSLP-2000
, vol.2
, pp. 302-305
-
-
Masuko, T.1
Tokuda, K.2
Kobayashi, T.3
-
17
-
-
0032664931
-
An Experimental Study of Speaker Verification Sensitivity to Computer Voice-Altered Imposters
-
B.L. Pellom, J.H.L. Hansen, "An Experimental Study of Speaker Verification Sensitivity to Computer Voice-Altered Imposters," IEEE ICASSP-99: Inter. Conf. on Acoustics, Speech, and Signal Processing, vol. 2, 1999, pp. 837-840
-
(1999)
IEEE ICASSP-99: Inter. Conf. on Acoustics, Speech, and Signal Processing
, vol.2
, pp. 837-840
-
-
Pellom, B.L.1
Hansen, J.H.L.2
-
18
-
-
35648960053
-
Wavelet-based voice morphing
-
C. Orphanidou, I.M. Moroz, and S.J. Roberts, "Wavelet-based voice morphing", WSEAS Journal on Systems, vol. 10 (3), 2004, pp. 3297-3302
-
(2004)
WSEAS Journal on Systems
, vol.10
, Issue.3
, pp. 3297-3302
-
-
Orphanidou, C.1
Moroz, I.M.2
Roberts, S.J.3
-
19
-
-
70349442652
-
Sound Morphing with Gaussian Mixture Models
-
F Boccardi, and C. Drioli, "Sound Morphing With Gaussian Mixture Models", in Proc. 4th COST-G6 Conference on Digital Audio Effects, Limerick, Ireland, 2001, pp. 44-48
-
Proc. 4th COST-G6 Conference on Digital Audio Effects, Limerick, Ireland, 2001
, pp. 44-48
-
-
Boccardi, F.1
Drioli, C.2
-
20
-
-
33947623206
-
Text-Independent Voice Conversion Based on Unit Selection
-
D. Sundermann, H. Hoge, A. Bonafonte, H. Ney,A. Black, and S. Narayanan, "Text-Independent Voice Conversion Based on Unit Selection", IEEE International Conference on Acoustics, Speech and Signal Processing, 2006, pp. 181-184
-
IEEE International Conference on Acoustics, Speech and Signal Processing, 2006
, pp. 181-184
-
-
Sundermann, D.1
Hoge, H.2
Bonafonte, A.3
Ney, H.4
Black, A.5
Narayanan, S.6
-
21
-
-
70450149422
-
Voice Conversion Based on Mapping Formants
-
Z. Shuang, R. Bakis, and Yong Qin, "Voice Conversion Based On Mapping Formants", TC-STAR Workshop on Speech-to-Speech, June 19-21, 2006, Barcelona
-
TC-STAR Workshop on Speech-to-Speech, June 19-21, 2006, Barcelona
-
-
Shuang, Z.1
Bakis, R.2
Qin, Y.3
-
22
-
-
14544274085
-
Vulnerability of speaker verification to voice mimicking
-
Y.W. Lau; M. Wagner, D. Tran, "Vulnerability of speaker verification to voice mimicking", . Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, pp.145-148
-
Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing
, pp. 145-148
-
-
Lau, Y.W.1
Wagner, M.2
Tran, D.3
-
23
-
-
84937277687
-
A report on a voice disguise experiment
-
H. Masthoff, "A report on a voice disguise experiment", Forensic Linguistics-Int.J. Speech, Language and the Law, 1996, vol. 3(1), pp. 50-64
-
(1996)
Forensic Linguistics-Int.J. Speech, Language and the Law
, vol.3
, Issue.1
, pp. 50-64
-
-
Masthoff, H.1
-
24
-
-
0003880013
-
-
the GangOfFour, Addison Wesley, USA
-
E. Gamma, R. Helm, R. Johnson, J. Vlissides (the GangOfFour), "Design Patterns: Elements of Reusable Object-Oriented Software", 1995, Addison Wesley, USA
-
(1995)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
25
-
-
62249214783
-
Simplifying Web Services Development with the Decorator Pattern
-
Published Dec 2007
-
J. Jones, 2007, "Simplifying Web Services Development with the Decorator Pattern", Oracle Technology Network, Published Dec 2007
-
(2007)
Oracle Technology Network
-
-
Jones, J.1
|