1 |
W. M. Campbell, D. E. Sturim and D. A. Reynolds, "Support vector machines using GMM supervectors for speaker verification," IEEE Signal Process. Lett., vol.13, no.5 pp.308-311, May 2006.
|
2 |
M. R. Enayah and A. Samsudin, "Securing telecommunication based on speaker voice as the public key," IJCSNS, pp.201-210, 2007.
|
3 |
P. Delacourt and C. J. Wellekens, "DISTBIC: a speaker-based segmentation for audio data indexing," Elsevier Speech Communication, vol.32, pp.111-126, Sep. 2000.
DOI
ScienceOn
|
4 |
R. D. Maesschalck, D. Jouan-Rimbaud and D. L. Massart, "Tutorial the Mahalanobis distance," Elsevier Chemometrics and Intelligent Laboratory systems, vol.50, pp.1-18, 2000.
DOI
ScienceOn
|
5 |
D. J. Kim and K. S. Hong, "Multimodal biometric authentication using teeth image and voice in mobile environment," IEEE transactions on Consumer Electronics, vol.54, no.4, pp.1790-1797, Nov. 2008.
DOI
|
6 |
B. H. Song, K. S. Chung and Y. T. Shin, "SRTP: TCP-friendly congestion control for multimedia streaming," Lecture Notes in Computer Science Springer-Verlag Press, vol.2344, pp.529-538, Sep. 2002.
|
7 |
M. E. Hellman, "An overview of public key cryptography." IEEE Communications Magazine, pp.42-49, May 2002.
|