Semi-automatic speaker verification system

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anti-spoofing Methods for Automatic Speaker Verification System

Growing interest in automatic speaker verification (ASV) systems has lead to significant quality improvement of spoofing attacks on them. Many research works confirm that despite the low equal error rate (EER) ASV systems are still vulnerable to spoofing attacks. In this work we overview different acoustic feature spaces and classifiers to determine reliable and robust countermeasures against s...

متن کامل

Discriminating semi-continuous HMM for speaker verification

This paper describes the use of a multiple codebook SCHMM speaker verification system, which uses a novel technique for discriminative hidden Markov modelling known as discriminative observation probabilities (DOP). DOP can easily be added to a multiple codebook HMM system and require minimal additional computation and no additional training. The DOP technique can be applied to both speech and ...

متن کامل

Deep Speaker Vectors for Semi Text-independent Speaker Verification

Recent research shows that deep neural networks (DNNs) can be used to extract deep speaker vectors (d-vectors) that preserve speaker characteristics and can be used in speaker verification. This new method has been tested on text-dependent speaker verification tasks, and improvement was reported when combined with the conventional i-vector method. This paper extends the d-vector approach to sem...

متن کامل

Segmental Approaches for Automatic Speaker Verification

Segmental Approaches for Automatic Speaker Verification Dijana Petrovska-Delacrétaz∗,1, Jan Černocký†, Jean Hennebert‡, and Gérard Chollet§ ∗Circuits and Systems Laboratory, Swiss Federal Institute of Technology, DE-CIRC, 1015 Lausanne, Switzerland; †Institute of Radio-electronics, Brno University of Technology, Czech Republic; ‡UpperSide Consulting, 52 Chaussée de Vleurgat, 1050 Brussels, Belg...

متن کامل

Spoofing and countermeasures for automatic speaker verification

It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Scientific and Technical Journal of Information Technologies, Mechanics and Optics

سال: 2016

ISSN: 2226-1494

DOI: 10.17586/2226-1494-2016-16-2-284-289