{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:57:50Z","timestamp":1725566270512},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235279"},{"type":"electronic","value":"9783540304630"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30463-0_80","type":"book-chapter","created":{"date-parts":[[2010,9,23]],"date-time":"2010-09-23T17:28:22Z","timestamp":1285262902000},"page":"637-644","source":"Crossref","is-referenced-by-count":2,"title":["SVM Applied to the Generation of Biometric Speech Key"],"prefix":"10.1007","author":[{"given":"L. Paola","family":"Garc\u00eda-Perera","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Mex-Perera","sequence":"additional","affiliation":[]},{"given":"Juan A.","family":"Nolazco-Flores","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"80_CR1","doi-asserted-by":"crossref","unstructured":"Boser, B., Guyon, I., Vapnik, V.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory (1992)","DOI":"10.1145\/130385.130401"},{"key":"80_CR2","unstructured":"Jr. Campbell, J.P.: Features and Measures for Speaker Recognition. Ph.D. Dissertation, Oklahoma State University (1992)"},{"key":"80_CR3","first-page":"273","volume":"20","author":"C. Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector network. Machine Learning\u00a020, 273\u2013297 (1995)","journal-title":"Machine Learning"},{"key":"80_CR4","unstructured":"Higgins, A., Porter, J., Bahler, L.: YOHO Speaker Authentication Final Report. ITT Defense Communications Division (1989)"},{"key":"80_CR5","unstructured":"HTK Hidden Markov Model Toolkit home page, \n                  \n                    http:\/\/htk.eng.cam.ac.uk\/"},{"key":"80_CR6","doi-asserted-by":"crossref","unstructured":"Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation From Voice. In: Proceedings of the IEEE Conference on Security and Privacy, Oakland, CA (May 2001)","DOI":"10.1109\/SECPRI.2001.924299"},{"issue":"11","key":"80_CR7","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R. Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password security: A case history. Communications of the ACM\u00a022(11), 594\u2013597 (1979)","journal-title":"Communications of the ACM"},{"issue":"2","key":"80_CR8","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/72.914517","volume":"12","author":"K.-R. M\u00fcller","year":"2001","unstructured":"M\u00fcller, K.-R., Mika, S., R\u00e4tsch, G., Tsuda, K., Sch\u00f6lkopf, B.: An introduction to kernel-based learning algorithms. IEEE Neural Networks\u00a012(2), 181\u2013201 (2001)","journal-title":"IEEE Neural Networks"},{"key":"80_CR9","unstructured":"Osuna, E., Freund, R., Girosi, F.: Support vector machines: Training and applications. Technical Report AIM-1602, MIT A.I. Lab. (1996)"},{"key":"80_CR10","doi-asserted-by":"crossref","unstructured":"Osuna, E., Freund, R., Girosi, F.: Training Support Vector Machines: An Application to Face Recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 130\u2013136 (1997)","DOI":"10.1109\/CVPR.1997.609310"},{"key":"80_CR11","volume-title":"Fundamentals of speech recognition","author":"L.R. Rabiner","year":"1993","unstructured":"Rabiner, L.R., Juang, B.-H.: Fundamentals of speech recognition. Prentice-Hall, New-Jersey (1993)"},{"key":"80_CR12","unstructured":"Joachims, T.: SVMLight: Support Vector Machine, SVM-Light Support Vector Machine, University of Dortmund (November 1999), \n                  \n                    http:\/\/svmlight.joachims.org\/"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30463-0_80.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:01:20Z","timestamp":1620000080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30463-0_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235279","9783540304630"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30463-0_80","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}