{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:14:22Z","timestamp":1730283262309,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1109\/mmcs.1999.778659","type":"proceedings-article","created":{"date-parts":[[2003,1,20]],"date-time":"2003-01-20T17:23:24Z","timestamp":1043083404000},"page":"1061-1064 vol.2","source":"Crossref","is-referenced-by-count":2,"title":["Multi modal verification for teleservices and security applications (M2VTS)"],"prefix":"10.1109","author":[{"given":"G.","family":"Richard","sequence":"first","affiliation":[{"name":"Matra Nortel Commun., Bois d'Arcy, France"}]},{"given":"Y.","family":"Mengay","sequence":"additional","affiliation":[]},{"given":"I.","family":"Guis","sequence":"additional","affiliation":[]},{"given":"N.","family":"Suaudeau","sequence":"additional","affiliation":[]},{"given":"J.","family":"Boudy","sequence":"additional","affiliation":[]},{"given":"P.","family":"Lockwood","sequence":"additional","affiliation":[]},{"given":"C.","family":"Fernandez","sequence":"additional","affiliation":[]},{"given":"F.","family":"Fernandez","sequence":"additional","affiliation":[]},{"given":"C.","family":"Kotropoulos","sequence":"additional","affiliation":[]},{"given":"A.","family":"Tefas","sequence":"additional","affiliation":[]},{"family":"Pitas","sequence":"additional","affiliation":[]},{"given":"R.","family":"Heimgartner","sequence":"additional","affiliation":[]},{"given":"P.","family":"Ryser","sequence":"additional","affiliation":[]},{"given":"C.","family":"Beumier","sequence":"additional","affiliation":[]},{"given":"P.","family":"Verlinde","sequence":"additional","affiliation":[]},{"given":"S.","family":"Pigeon","sequence":"additional","affiliation":[]},{"given":"G.","family":"Matas","sequence":"additional","affiliation":[]},{"given":"J.","family":"Kittler","sequence":"additional","affiliation":[]},{"given":"J.","family":"Biglin","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Abdeljaoued","sequence":"additional","affiliation":[]},{"given":"E.","family":"Meurville","sequence":"additional","affiliation":[]},{"given":"L.","family":"Besacier","sequence":"additional","affiliation":[]},{"given":"M.","family":"Ansorge","sequence":"additional","affiliation":[]},{"given":"G.","family":"Maitre","sequence":"additional","affiliation":[]},{"given":"J.","family":"Luettin","sequence":"additional","affiliation":[]},{"given":"S.","family":"Ben-Yacoub","sequence":"additional","affiliation":[]},{"given":"B.","family":"Ruiz","sequence":"additional","affiliation":[]},{"given":"K.","family":"Aldama","sequence":"additional","affiliation":[]},{"given":"J.","family":"Cortes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5244\/C.12.45"},{"key":"ref11","article-title":"Acoustic-Labial Speaker Verification","author":"jourlin","year":"0","journal-title":"Pattern Rec Letters"},{"key":"ref12","article-title":"Person Authentication by Fusing Face and Speech Information","author":"duc","year":"1997","journal-title":"Proceedings of AVBPA'97"},{"key":"ref13","article-title":"The M2VTS multimodal face database","author":"pigeon","year":"1997","journal-title":"Proceedings of AVBPA'97"},{"journal-title":"Multi Modal Data Fusion for Person Authentication using SVM","year":"0","author":"ben-yacoub","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1999.757612"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/5.628714"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/5.381842"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723441"},{"key":"ref5","article-title":"Face authentication with Gabor information on deformabie graphs","author":"due","year":"1997","journal-title":"IEEE Trans on Image Processing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00087-5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(98)00176-0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1996.0570"},{"key":"ref1","first-page":"1756","article-title":"Combining methods to improve the phone based speaker verification decision","volume":"3","author":"genoud","year":"1996","journal-title":"ICSLP'96"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"}],"event":{"name":"Proceedings of ICMCS99: IEEE Multimedia Systems '99: International Conference on Multimedia Computing and Systems","start":{"date-parts":[[1999,6,7]]},"location":"Florence, Italy","end":{"date-parts":[[1999,6,11]]}},"container-title":["Proceedings IEEE International Conference on Multimedia Computing and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6322\/16898\/00778659.pdf?arnumber=778659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T17:56:30Z","timestamp":1721843790000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/778659\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/mmcs.1999.778659","relation":{},"subject":[],"published":{"date-parts":[[1999]]}}}