Making Confident Speaker Verification Decisions With Minimal Speech
نویسندگان
چکیده
منابع مشابه
Speaker verification with GSM coded telephone speech
In this paper we investigate the impact on the performance of Speaker Veriication (SV) systems of the signal and channel coding in GSM cellular telephone networks. In this study only the eeects of the codec are investigated. This is done by transcoding the signals in an existing speech corpus, recorded in the xed network, to GSM. We compared text dependent SV performance of systems trained with...
متن کاملSpeaker Verification Using Coded Speech
The implementation of a pseudo text-independent Speaker Verification system is described. This system was designed to use only information extracted directly from the coded parameters embedded in the ITU-T G.729 bitstream. Experiments were performed over the YOHO database [1]. The feature vector as a short-time representation of speech consists of 16 LPC-Cepstral coefficients, as well as residu...
متن کاملSpeaker verification based on phonetic decision making
Speaker verification based on phone modelling is examined in this paper. Phone modelling is attractive, because different phonemes have different levels of usefulness for speaker recognition, and because phone modelling essentially makes a speaker verification algorithm text independent. The speaker verification system used here is based on a two stage approach, where speech recognition (segmen...
متن کاملConsidering speech quality in speaker verification fusion
This paper emphasizes the benefits of embedding data categorization within fusion of classifiers for text-independent speaker verification. A selective fusion framework is presented which considers data idiosyncrasies by assigning particular test samples to appropriate fusion schemes. As an extension, incompatible data can be spotted and excluded from inherent classification errors. In addition...
متن کاملSpeech detection for text-dependent speaker verification
The performance of text-dependent speaker verification systems degrades in noisy environment and when the true speaker utters words that are not part of the verification password. Energy-based voice activity detection (VAD) algorithms cannot distinguish between the true speaker’s speech and other background speech or between the speaker’s verification password and other words uttered by the spe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Audio, Speech, and Language Processing
سال: 2010
ISSN: 1558-7916
DOI: 10.1109/tasl.2009.2031505