{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:21:13Z","timestamp":1737436873825,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745488"},{"type":"electronic","value":"9783540745495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74549-5_65","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T06:01:49Z","timestamp":1188367309000},"page":"614-624","source":"Crossref","is-referenced-by-count":8,"title":["On the Use of Log-Likelihood Ratio Based Model-Specific Score Normalisation in Biometric Authentication"],"prefix":"10.1007","author":[{"given":"Norman","family":"Poh","sequence":"first","affiliation":[]},{"given":"Josef","family":"Kittler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","doi-asserted-by":"crossref","unstructured":"Doddington, G., Liggett, W., Martin, A., Przybocki, M., Reynolds, D.: Sheep, Goats, Lambs and Woves: A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation. In: ICSLP. Int\u2019l Conf. Spoken Language Processing, Sydney (1998)","DOI":"10.21437\/ICSLP.1998-244"},{"issue":"2","key":"65_CR2","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/TASSP.1981.1163530","volume":"29","author":"S. Furui","year":"1981","unstructured":"Furui, S.: Cepstral Analysis for Automatic Speaker Verification. IEEE Trans. Acoustic, Speech and Audio Processing \/ IEEE Trans. on Signal Processing\u00a029(2), 254\u2013272 (1981)","journal-title":"IEEE Trans. Acoustic, Speech and Audio Processing \/ IEEE Trans. on Signal Processing"},{"key":"65_CR3","unstructured":"Pierrot, J.-B.: Elaboration et Validation d\u2019Approaches en V\u00e9rification du Locuteur, Ph.D. thesis, ENST, Paris (September 1998)"},{"issue":"2","key":"65_CR4","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/S0031-3203(02)00034-1","volume":"36","author":"K. Chen","year":"2003","unstructured":"Chen, K.: Towards Better Making a Decision in Speaker Verification. Pattern Recognition\u00a036(2), 329\u2013346 (2003)","journal-title":"Pattern Recognition"},{"key":"65_CR5","unstructured":"Saeta, J.R., Hernando, J.: On the Use of Score Pruning in Speaker Verification for Speaker Dependent Threshold Estimation. In: The Speaker and Language Recognition Workshop (Odyssey), Toledo, pp. 215\u2013218 (2004)"},{"key":"65_CR6","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/S0262-8856(02)00009-4","volume":"20","author":"K. Jonsson","year":"2002","unstructured":"Jonsson, K., Kittler, J., Li, Y.P., Matas, J.: Support vector machines for face authentication. Image and Vision Computing\u00a020, 269\u2013275 (2002)","journal-title":"Image and Vision Computing"},{"key":"65_CR7","unstructured":"Lindberg, J., Koolwaaij, J.W., Hutter, H.-P., Genoud, D., Blomberg, M., Pierrot, J.-B., Bimbot, F.: Techniques for a priori Decision Threshold Estimation in Speaker Verification. In: Proc. of the Workshop Reconnaissance du Locuteur et ses Applications Commerciales et Criminalistiques (RLA2C), Avignon, pp. 89\u201392 (1998)"},{"key":"65_CR8","unstructured":"Genoud, D.: Reconnaissance et Transformation de Locuteur, Ph.D. thesis, Ecole Polythechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Switzerland (1998)"},{"key":"65_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1007\/978-3-540-25948-0_68","volume-title":"Biometric Authentication","author":"J. Fierrez-Aguilar","year":"2004","unstructured":"Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J.: Target Dependent Score Normalisation Techniques and Their Application to Signature Verification. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol.\u00a03072, pp. 498\u2013504. Springer, Heidelberg (2004)"},{"key":"65_CR10","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1006\/dspr.1999.0360","volume":"10","author":"R. Auckenthaler","year":"2000","unstructured":"Auckenthaler, R., Carey, M., Lloyd-Thomas, H.: Score Normalization for Text-Independant Speaker Verification Systems. Digital Signal Processing (DSP) Journal\u00a010, 42\u201354 (2000)","journal-title":"Digital Signal Processing (DSP) Journal"},{"key":"65_CR11","doi-asserted-by":"crossref","unstructured":"Ben, M., Blouet, R., Bimbot, F.: A Monte-Carlo Method For Score Normalization in Automatic Speaker Verification Using Kullback-Leibler Distances. In: ICASSP. Proc. Int. Conf. Acoustics, Speech and Signal Processing, Orlando, vol.\u00a01, pp. 689\u2013692 (2002)","DOI":"10.1109\/ICASSP.2002.5743811"},{"key":"65_CR12","doi-asserted-by":"crossref","unstructured":"Poh, N., Bengio, S.: F-ratio Client-Dependent Normalisation on Biometric Authentication Tasks. In: ICASSP. IEEE Int\u2019l Conf. Acoustics, Speech, and Signal Processing, Philadelphia, pp. 721\u2013724 (2005)","DOI":"10.1109\/ICASSP.2005.1415215"},{"issue":"2","key":"65_CR13","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.patcog.2005.06.011","volume":"39","author":"N. Poh","year":"2005","unstructured":"Poh, N., Bengio, S.: Database, Protocol and Tools for Evaluating Score-Level Fusion Algorithms in Biometric Authentication. Pattern Recognition\u00a039(2), 223\u2013233 (2005)","journal-title":"Pattern Recognition"},{"issue":"10","key":"65_CR14","doi-asserted-by":"publisher","first-page":"3059","DOI":"10.1109\/TSP.2004.833862","volume":"52","author":"K.-A. Toh","year":"2004","unstructured":"Toh, K.-A., Jiang, X., Yau, W.-Y.: Exploiting Global and Local Decision for Multimodal Biometrics Verification. IEEE Trans. on Signal Processing\u00a052(10), 3059\u20133072 (2004)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"65_CR15","first-page":"290","volume":"2","author":"J.L. Gauvain","year":"1994","unstructured":"Gauvain, J.L., Lee, C.-H.: Maximum a Posteriori Estimation for Multivariate Gaussian Mixture Obervation of Markov Chains. IEEE Tran. Speech Audio Processing\u00a02, 290\u2013298 (1994)","journal-title":"IEEE Tran. Speech Audio Processing"},{"key":"65_CR16","doi-asserted-by":"publisher","first-page":"165","DOI":"10.2307\/2289860","volume":"84","author":"J. Friedman","year":"1989","unstructured":"Friedman, J.: Regularized discriminant analysis. J. American Statiscal Association\u00a084, 165\u2013175 (1989)","journal-title":"J. American Statiscal Association"},{"issue":"12","key":"65_CR17","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1109\/TPAMI.2006.255","volume":"28","author":"S.C. Dass","year":"2006","unstructured":"Dass, S.C., Zhu, Y., Jain, A.K.: Validating a biometric authentication system: Sample size requirements. IEEE Trans. Pattern Analysis and Machine Intelligence\u00a028(12), 1302\u20131319 (2006)","journal-title":"IEEE Trans. Pattern Analysis and Machine Intelligence"},{"key":"65_CR18","doi-asserted-by":"crossref","unstructured":"Matas, J., Hamouz, M., Jonsson, K., Kittler, J., Li, Y., Kotropoulos, C., Tefas, A., Pitas, I., Tan, T., Yan, H., Smeraldi, F., Begun, J., Capdevielle, N., Gerstner, W., Ben-Yacoub, S., Abdeljaoued, Y., Mayoraz, E.: Comparison of Face Verification Results on the XM2VTS Database. In: Proc. 15th Int\u2019l Conf. Pattern Recognition, Barcelona, vol.\u00a04, pp. 858\u2013863 (2000)","DOI":"10.1109\/ICPR.2000.903052"},{"key":"65_CR19","doi-asserted-by":"crossref","unstructured":"Martin, A., Doddington, G., Kamm, T., Ordowsk, M., Przybocki, M.: The DET Curve in Assessment of Detection Task Performance. In: Proc. Eurospeech 1997, Rhodes, pp. 1895\u20131898 (1997)","DOI":"10.21437\/Eurospeech.1997-504"},{"key":"65_CR20","unstructured":"Bengio, S., Mari\u00e9thoz, J.: The Expected Performance Curve: a New Assessment Measure for Person Authentication. In: The Speaker and Language Recognition Workshop (Odyssey), Toledo, pp. 279\u2013284 (2004)"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_65.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:42:56Z","timestamp":1737398576000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745488","9783540745495"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}