Evaluation on Score Reliability for Biometric Speaker Authentication Systems

نویسندگان

  • Muhammad Hazim Hasan
  • Haryati Jaafar
  • Dzati Athiar Ramli
چکیده

Problem statement: Fusion weight tuning based on score reliability is imperative in order to ensure the performances of multibiometric systems are sustained. Approach: In this study, two variant of conditions i.e., different performances of individual subsystems and inconsistent quality of test samples are experimented to multibiometric systems. By applying multialgorithm scheme, two types of features extraction method i.e., Linear Predictive Coding (LPC) and Mel Frequency Cepstrum Coefficient (MFCC) are executed in this study. Support Vector Machine (SVM) is used as a classifier for both subsystems for the pattern matching process. Scores from both LPC and MFCC based sub systems are fused at score level fusion using fixed weighting and adaptive weighting approaches. For fixed weighting, sum-rule method is employed while for the adaptive weighting, sum-rule based on weight adaptation and sum-rule with weight produced from fuzzy logic inference are executed. The performances of single, fixed and adaptive systems are then compared. Results: Experimental results show that at 40dB and 20dB SNR signals, EER performances of single systems are 1.1730 and 38.2695% respectively. Consequently, the EER performances are observed as 2.7355 and 1.1359% for the sum-rule based on weight adaptation and sum-rule with weight produced from Fuzzy Logic. Conclusion: The results show that fusion system based on fuzzy logic gives advantage due to its capability in adjusting the weight based on the subsystem performance and quality of the current data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

MMUA 2003 Proceedings

This article addresses the setting up of a Biometric Authentication System (BAS) based on the fusion of two user-friendly biometric modalities: signature and speech. All biometric data used in this work were extracted from the BIOMET multimodal database [1]. The Signature Verification system relies on Hidden Markov Models (HMMs) [2], and we use two kinds of Speaker Verification systems. The fir...

متن کامل

Quality-Based Score Normalization for Audiovisual Person Authentication

This paper addresses the problem of biometric audiovisual person authentication in realistic acquisition conditions. Differences in environmental factors or acquisition devices between enrollment and test conditions modify the verification scores distribution and degrade verification performance if not taken into account. A theoretical framework that incorporates quality measures to biometric a...

متن کامل

Fuzzy Fusion in Multimodal Biometric Systems

Multimodal authentication systems represent an emerging trend for information security. These systems could replace conventional mono-modal biometric methods using two or more features for robust biometric authentication tasks. They employ unique combinations of measurable physical characteristics: fingerprint, facial features, iris of the eye, voice print, hand geometry, vein patterns, and so ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012