Speech and Signal Processing, IEEE Transactions on,
28(4):357–366.
Ellis, D. P. W. (2005). PLP and RASTA (and MFCC, and
inversion) in Matlab. www.ee.columbia.edu/∼dpwe/
resources/matlab/rastamat.
Ganchev, T., Fakotakis, N., and Kokkinakis, G. (2005).
Comparative evaluation of various MFCC implemen-
tations on the speaker verification task. In Proceed-
ings of the SPECOM, volume 1, pages 191–194. Cite-
seer.
Heck, L. and Mirghafori, N. (2000). On-line unsupervised
adaptation in speaker verification. In Sixth Interna-
tional Conference on Spoken Language Processing.
Higgins, A., Porter, J., and Bahler, L. (1989). YOHO
speaker authentication final report. ITT Defense Com-
munications Division.
Kenny, P., Boulianne, G., and Dumouchel, P. (2005). Eigen-
voice modeling with sparse training data. Speech and
Audio Processing, IEEE Transactions on, 13(3):345–
354.
Kenny, P., Boulianne, G., Ouellet, P., and Dumouchel, P.
(2007). Joint factor analysis versus eigenchannels in
speaker recognition. Audio, Speech, and Language
Processing, IEEE Transactions on, 15(4):1435–1447.
Kenny, P., Ouellet, P., Dehak, N., Gupta, V., and Du-
mouchel, P. (2008). A study of interspeaker variability
in speaker verification. Audio, Speech, and Language
Processing, IEEE Transactions on, 16(5):980–988.
Kinnunen, T. (2003). Spectral features for automatic text-
independent speaker recognition. Licentiatesthesis,
Department of computer science, University of Joen-
suu.
Krause, N. and Gazit, R. (2006). SVM-based Speaker Clas-
sification in the GMM Models Space. In Speaker
and Language Recognition Workshop, 2006. IEEE
Odyssey 2006: The, pages 1–5. IEEE.
Marco F, H., Tim, B., Hugh, D.-W., and Uwe D., H. (2008).
On entropy approximation for Gaussian mixture ran-
dom vectors. In IEEE International Conference on
In Multisensor Fusion and Integration for Intelligent
Systems.
Microsoft Corporation (2011). System.speech program-
ming guide for .net framework 4.0. Microsoft Devel-
oper Network (MSDN).
Miller, D. and Top, D. (2010). Voice biometrics 2010: A
transformative year for voice-based authentication.
Mirghafori, N. and Heck, L. (2002). An adaptive speaker
verification system with speaker dependent a priori
decision thresholds. In Seventh International Confer-
ence on Spoken Language Processing.
Monrose, F., Reiter, M., Li, Q., and Wetzel, S. (2001a).
Cryptographic key generation from voice. sp, page
0202.
Monrose, F., Reiter, M., Li, Q., and Wetzel, S. (2001b). Us-
ing voice to generate cryptographic keys. In 2001: A
Speaker Odyssey-The Speaker Recognition Workshop.
Citeseer.
Reynolds, D., Quatieri, T., and Dunn, R. (2000). Speaker
verification using adapted Gaussian mixture models.
Digital signal processing, 10(1-3):19–41.
Reynolds, D. and Rose, R. (1995). Robust text-independent
speaker identification using Gaussian mixture speaker
models. IEEE Transactions on speech and audio pro-
cessing, 3(1):72–83.
Soong, F. and Rosenberg, A. (1988). On the use of instanta-
neous and transitional spectral information in speaker
recognition. Acoustics, Speech and Signal Processing,
IEEE Transactions on, 36(6):871–879.
Teunen, R., Shahshahani, B., and Heck, L. (2000).
A model-based transformational approach to robust
speaker recognition. In Sixth International Confer-
ence on Spoken Language Processing.
Vergin, R., O’Shaughnessy, D., and Gupta, V. (1996). Com-
pensated mel frequency cepstrum coefficients. In
ICASSP ’96: Proceedings of the Acoustics, Speech,
and Signal Processing, 1996. on Conference Proceed-
ings., 1996 IEEE International Conference, pages
323–326, Washington, DC, USA. IEEE Computer So-
ciety.
VoicePasswordsRevisited
171