Speaker authentication system using soft computing approaches
نویسندگان
چکیده
Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources. r 2005 Elsevier B.V. All rights reserved.
منابع مشابه
Estimating scour below inverted siphon structures using stochastic and soft computing approaches
This paper uses nonlinear regression, Artificial Neural Network (ANN) and Genetic Programming (GP) approaches for predicting an important tangible issue i.e. scours dimensions downstream of inverted siphon structures. Dimensional analysis and nonlinear regression-based equations was proposed for estimation of maximum scour depth, location of the scour hole, location and height of the dune downs...
متن کاملSpeaker verification on the world wide web
This paper describes a system for controlling access to web resources built using well-known speaker verification techniques. We describe the implementation of a speech verification server and an associated authentication module for the Apache web server. Speaker verification requires two inputs: a sample of the user’s speech and an identity claim for the user; typically the user’s name. Howeve...
متن کاملUsing the Reaction Delay as the Driver Effects in the Development of Car-Following Models
Car-following models, as the most popular microscopic traffic flow modeling, is increasingly being used by transportation experts to evaluate new Intelligent Transportation System (ITS) applications. A number of factors including individual differences of age, gender, and risk-taking behavior, have been found to influence car-following behavior. This paper presents a novel idea to calculate ...
متن کاملInvestigating electrochemical drilling (ECD) using statistical and soft computing techniques
In the present study, five modeling approaches of RA, MLP, MNN, GFF, and CANFIS were applied so as to estimate the radial overcut values in electrochemical drilling process. For these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. The developed models were evaluated in terms of their prediction capability with m...
متن کاملAn Attack on a Text-independent Speaker Authentication System
We mount an effective attack on a third-party open-source text-independent speaker verification system. Specifically, we show how an attacker can simply use a signal generated at fixed frequency to pass speaker verification and gain access to other user accounts. We demonstrate this attack on the GMM-UBM based ALIZE speaker verification system using the YOHO voice database. We show through expe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Neurocomputing
دوره 68 شماره
صفحات -
تاریخ انتشار 2005