{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:55:44Z","timestamp":1761580544660,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540403029"},{"type":"electronic","value":"9783540448877"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44887-x_106","type":"book-chapter","created":{"date-parts":[[2007,10,20]],"date-time":"2007-10-20T18:16:42Z","timestamp":1192904202000},"page":"911-920","source":"Crossref","is-referenced-by-count":42,"title":["Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS"],"prefix":"10.1007","author":[{"given":"Fabien","family":"Cardinaux","sequence":"first","affiliation":[]},{"given":"Conrad","family":"Sanderson","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Marcel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"key":"106_CR1","unstructured":"Collobert, R., Bengio, S., and Mari\u00e9thoz, J.: Torch: a modular machine learning software library. IDIAP Research Report 02-46 (2002), Martigny, Switzerland. (see also http:\/\/www.torch.ch ) 914"},{"key":"106_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"A.P. Dempster","year":"1977","unstructured":"Dempster, A.P., Laird, N.M., and Rubin, D. B.: Maximum likelihood from incomplete data via the EM algorithm. J. Royal Statistical Soc., Ser. B 39 (1977) 1\u201338.","journal-title":"J. Royal Statistical Soc."},{"key":"106_CR3","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., and Stork, D.G.: Pattern Classification. John Wiley & Sons, USA, 2001."},{"key":"106_CR4","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/S0262-8856(99)00055-4","volume":"18","author":"S. Eickeler","year":"2000","unstructured":"Eickeler, S., M\u00fcller, S., Rigoll, G.: Recognition of JPEG Compressed Face Images Based on Statistical Methods. Image and Vision Computing 18 (2000) 279\u2013287.","journal-title":"Image and Vision Computing"},{"key":"106_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/34.899945","volume":"23","author":"R. F\u00e9raud","year":"2001","unstructured":"F\u00e9raud, R., Bernier, O., Viallet, J.-E., and Collobert, M.: A Fast and Accurate Face Detector Based on Neural Networks. Trans. Pattern Analysis and Machine Intell. 23 (2001) 42\u201353.","journal-title":"Trans. Pattern Analysis and Machine Intell."},{"key":"106_CR6","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/89.279278","volume":"2","author":"J.-L. Gauvain","year":"1994","unstructured":"Gauvain, J-L., and Lee, C-H.: Maximum a Posteriori Estimation for Multivariate Gaussian Mixture Observations of Markov Chains. IEEE Trans. Speech and Audio Processing 2 (1994) 291\u2013298.","journal-title":"IEEE Trans. Speech and Audio Processing"},{"key":"106_CR7","volume-title":"Digital Image Processing","author":"R. C. Gonzales","year":"1993","unstructured":"Gonzales, R. C., and Woods, R. E.: Digital Image Processing. Addison-Wesley, Reading, Massachusetts, 1993."},{"key":"106_CR8","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1016\/S0167-8655(97)00062-7","volume":"18","author":"J. Kittler","year":"1997","unstructured":"Kittler, J., Matas, G., Jonsson, K., and Sanchez, M. U. R.: Combining Evidence in Personal Identity Verification Systems. Pattern Recognition Letters 18 (1997) 845\u2013852.","journal-title":"Pattern Recognition Letters"},{"key":"106_CR9","unstructured":"L\u00fcttin, J., and Ma\u00eetre, G.: Evaluation Protocol for the Extended M2VTS Database (XM2VTSDB). IDIAP Communication 98-05 (1998), Martigny, Switzerland."},{"key":"106_CR10","doi-asserted-by":"crossref","unstructured":"Martin, A., Doddington, G., Kamm, T., Ordowski, M., and Przybocki, M.: The DET Curve in Assessment of Detection Task Performance. Proc. Eurospeech\u201997, 1997, pp. 1895\u20131898.","DOI":"10.21437\/Eurospeech.1997-504"},{"key":"106_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"D. Reynolds","year":"2000","unstructured":"Reynolds, D., Quatieri, T., and Dunn, R.: Speaker Verification Using Adapted Gaussian Mixture Models. Digital Signal Processing 10 (2000) 19\u201341.","journal-title":"Digital Signal Processing"},{"key":"106_CR12","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/34.655647","volume":"20","author":"H.A. Rowley","year":"1998","unstructured":"Rowley, H.A., Baluja, S., and Kanade, T.: Neural Network-Based Face Detection. Trans. Pattern Analysis and Machine Intelligence 20 (1998) 23\u201338.","journal-title":"Trans. Pattern Analysis and Machine Intelligence"},{"key":"106_CR13","unstructured":"Sanderson, C.: Automatic Person Verification Using Speech and Face Information. PhD Thesis, Griffith University, Brisbane, Australia, 2002."},{"key":"106_CR14","doi-asserted-by":"crossref","unstructured":"Sanderson, C. and Paliwal, K.K.: Polynomial Features for Robust Face Authentication. Proc. International Conf. on Image Processing, Rochester, New York, 2002, pp. 997\u20131000 (Vol. 3).","DOI":"10.1109\/ICIP.2002.1039143"},{"key":"106_CR15","volume-title":"Pattern recognition: statistical, structural and neural approaches","author":"R. J. Schalko","year":"1992","unstructured":"Schalko., R. J.: Pattern recognition: statistical, structural and neural approaches. John Wiley & Sons, USA, 1992."},{"key":"106_CR16","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/S1566-2535(00)00002-6","volume":"1","author":"P. Verlinde","year":"2000","unstructured":"Verlinde, P., Chollet, G., and Acheroy, M.: Multi-modal identity verification using expert fusion. Information Fusion 1 (2000) 17\u201333.","journal-title":"Information Fusion"}],"container-title":["Lecture Notes in Computer Science","Audio- and Video-Based Biometric Person Authentication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44887-X_106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T20:01:55Z","timestamp":1737489715000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44887-X_106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540403029","9783540448877"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44887-x_106","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}