{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:54:46Z","timestamp":1725490486913},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745488"},{"type":"electronic","value":"9783540745495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74549-5_47","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T02:01:49Z","timestamp":1188352909000},"page":"445-454","source":"Crossref","is-referenced-by-count":2,"title":["Probabilistic Random Projections and Speaker Verification"],"prefix":"10.1007","author":[{"given":"Chong Lee","family":"Ying","sequence":"first","affiliation":[]},{"given":"Andrew Teoh Beng","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"N. Ratha","year":"2001","unstructured":"Ratha, N., Connell, J., Bolle, R.M.: Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Syst. J.\u00a040, 614\u2013634 (2001)","journal-title":"IBM Syst. J."},{"key":"47_CR2","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U. Uludag","year":"2004","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proc. IEEE\u00a092, 948\u2013960 (2004)","journal-title":"Proc. IEEE"},{"key":"47_CR3","first-page":"649","volume-title":"ICSA Guide to Cryptography","author":"C. Soutar","year":"1999","unstructured":"Soutar, C., Roberge, D., Stoianov, A.R., Gilroy, Vijaya Kumar, B.V.K.: Biometrics Encryption. In: Nichols, R.K. (ed.) ICSA Guide to Cryptography, pp. 649\u2013675. McGraw-Hill, New York (1999)"},{"key":"47_CR4","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1016\/j.cose.2004.06.002","volume":"23","author":"B.J.A. Teoh","year":"2004","unstructured":"Teoh, B.J.A., Ngo, C.L.D., Goh, A.: Personalised Cryptographic Key Generation Based on FaceHashing. Computers and Security J.\u00a023, 606\u2013614 (2004)","journal-title":"Computers and Security J."},{"key":"47_CR5","first-page":"922","volume":"3","author":"M. Savvides","year":"2004","unstructured":"Savvides, M., Vijava Kumar, B.V.K., Khosla, P.K.: Cancelable Biometrics Filters for Face Recognition. Int. Conf. of Pattern Recognition\u00a03, 922\u2013925 (2004)","journal-title":"Int. Conf. of Pattern Recognition"},{"key":"47_CR6","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1587\/elex.2.226","volume":"2","author":"T.Y. Chong","year":"2005","unstructured":"Chong, T.Y., Teoh, B.J.A., Ngo, C.L.D., Goh, M.: Multi-Space Random Mapping for Speaker Identification. IEICE Electron. Express\u00a02, 226\u2013231 (2005)","journal-title":"IEICE Electron. Express"},{"issue":"12","key":"47_CR7","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TPAMI.2006.250","volume":"28","author":"B.J.A. Teoh","year":"2006","unstructured":"Teoh, B.J.A., Ngo, C.L.D., Goh, A.: Random Multispace Quantisation as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a028(12), 1892\u20131901 (2006)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"47_CR8","volume-title":"Fifth IEEE Workshop on Automatic Identification Advanced Technologies","author":"L.Y. Chong","year":"2007","unstructured":"Chong, L.Y., Teoh, B.J.A., Khor, S.E.: 2D CLAFIC Subspace Technique in Probabilistic Speaker Verification. In: Fifth IEEE Workshop on Automatic Identification Advanced Technologies, IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"47_CR9","doi-asserted-by":"crossref","unstructured":"Teoh, B.J.A., Chong, T.Y.: Cancellable Biometrics Realization with Multispace Random Projections. Accepted to publish in IEEE Transactions SMC Part B (2007)","DOI":"10.1109\/TSMCB.2007.903538"},{"key":"47_CR10","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/PROC.1975.9792","volume":"63","author":"J. Makhoul","year":"1975","unstructured":"Makhoul, J.: Linear Prediction: A tutorial review. Proc. IEEE\u00a063, 561\u2013580 (1975)","journal-title":"Proc. IEEE"},{"key":"47_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1006\/dspr.1999.0361","volume":"10","author":"D.A. Reynolds","year":"2000","unstructured":"Reynolds, D.A.: Speaker Verification using Adapted Gaussian Mixture Models. Digital Signal Processing\u00a010, 19\u201341 (2000)","journal-title":"Digital Signal Processing"},{"key":"47_CR12","unstructured":"Higgins, A.: YOHO Speaker Verification. In: Speech Research Symposium (1990)"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:23:30Z","timestamp":1619504610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745488","9783540745495"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}