{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:34:59Z","timestamp":1761647699684},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642043901"},{"type":"electronic","value":"9783642043918"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04391-8_22","type":"book-chapter","created":{"date-parts":[[2009,9,23]],"date-time":"2009-09-23T08:07:48Z","timestamp":1253693268000},"page":"170-177","source":"Crossref","is-referenced-by-count":4,"title":["Key Generation in a Voice Based Template Free Biometric Security System"],"prefix":"10.1007","author":[{"given":"Joshua A.","family":"Atah","sequence":"first","affiliation":[]},{"given":"Gareth","family":"Howells","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Biometric Systems: Technology, Design and Performance Evaluation","year":"2002","key":"22_CR1","unstructured":"Maltoni, Anil, Wayman, Dario (eds.): Biometric Systems: Technology, Design and Performance Evaluation. Springer, Heidelberg (2002)"},{"key":"22_CR2","unstructured":"Wayman, J.: Fundamentals of biometric authentication technologies. Int. J. Imaging and Graphics\u00a01(1) (2001)"},{"key":"22_CR3","unstructured":"http:\/\/ee.ucd.ie\/validdb\/datasets.html"},{"key":"22_CR4","unstructured":"Poh, N., Bengio, S.: A study of the effect of score normalization prior to fusion in Biometric Authentication Tasks (December 2004)"},{"key":"22_CR5","volume-title":"Statistics for Dummies","author":"D. Rumsey","year":"2003","unstructured":"Rumsey, D.: Statistics for Dummies. Wiley publishing Inc., Indiana (2003)"},{"key":"22_CR6","unstructured":"Atah, J.A., Howells, G.: Score Normalisation of Voice Features for Template Free Biometric Encryption. In: The 2008 multi-conference in computer science, information technology, computer engineering, control and automation technology, Orlando, FL, USA (July 2008)"},{"key":"22_CR7","unstructured":"Nandakumar, K.: Integration of multiple cues in biometric systems, PhD thesis, Michigan State University (2005)"},{"key":"22_CR8","unstructured":"Koutsoyiannis, A.: Theory of Econometrics, 2nd edn. Palgrave, New York"},{"key":"22_CR9","unstructured":"http:\/\/biosecure.it-sudparis.eu\/AB\/"},{"issue":"2","key":"22_CR10","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/TIFS.2008.922056","volume":"3","author":"W. Sheng","year":"2008","unstructured":"Sheng, W., Howells, G., Fairhurst, M.C., Deravi, F.: Template-free Biometric Key Generation by means of Fuzzy Genetic Clustering. Information Forensics and Security\u00a03(2), 183\u2013191 (2008)","journal-title":"Information Forensics and Security"},{"key":"22_CR11","unstructured":"Deravi, F., Lockie, M.: Biometric Industry Report - Market and Technology Forecasts to 2003, Elsevier Advanced Technology (December 2000)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition\u00a035(12) (December 2002)","DOI":"10.1016\/S0031-3203(01)00247-3"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Howells, W.G.J., Selim, H., Hoque, S., Fairhurst, M.C., Deravi, F.: An Autonomous Document Object (ADO) Model. In: Proceedings of the 6th International Conference on Document Analysis and Recognition (ICDAR 2001), Seattle, Washington, USA, September 2001, pp. 977\u2013981 (2001)","DOI":"10.1109\/ICDAR.2001.953931"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Hoque, S., Selim, H., Howells, G., Fairhurst, M.C., Deravi, F.: SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution. In: Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR 2003), Edinburgh, Scotland (2003)","DOI":"10.1109\/ICDAR.2003.1227859"},{"key":"22_CR15","unstructured":"Howells, G., Selim, H., Fairhurst, M.C., Deravi, F., Hoque, S.: SAGENT: A Model for Security of Distributed Multimedia. Submitted to IEEE Transactions on System, Man and Cybernetics"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/ip-vis:19990015","volume":"146","author":"A.F.R. Rahman","year":"1999","unstructured":"Rahman, A.F.R., Fairhurst, M.C.: Enhancing multiple expert decision combination strategies through exploitation of a priori information sources. IEE Proc. on Vision, Image and Signal Processing\u00a0146, 1\u201310 (1999)","journal-title":"IEE Proc. on Vision, Image and Signal Processing"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Sirlantzis, K., Hoque, S., Fairhurst, M.C.: Trainable multiple classifier schemes for handwritten character recognition. In: Proc. 3rd Int. Workshop on Multiple Classifier Systems, Cagliari, Italy, pp. 169\u2013178","DOI":"10.1007\/3-540-45428-4_17"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Chibelushi, C.C., Mason, J.S.D., Deravi, F.: Audio-Visual Person Recognition: An Evaluation of Data Fusion Strategies. In: Proc. European Conference on Security, London, April 28-30, 1997, pp. 26\u201330. IEE (1997)","DOI":"10.1049\/cp:19970414"},{"key":"22_CR19","unstructured":"Jain, A.K., Prabakar, S., Ross, A.: Biometrics Based Web Access. Technical Report TR98-33, Michigan State University (1998)"}],"container-title":["Lecture Notes in Computer Science","Biometric ID Management and Multimodal Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04391-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T17:57:46Z","timestamp":1552154266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04391-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642043901","9783642043918"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04391-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}