Verbal Information Verification for High - performance Speaker Authentication
نویسندگان
چکیده
of thesis entitled: Verbal Information Verification for High-performance Speaker Authentication Submitted by QIN Chao for the degree of Master of Philosophy in Electronic Engineering at The Chinese University of Hong Kong in June 2005. Automatic speaker authentication is to authenticate the identity of a claimed speaker by verifying the identity-related information embedded in his/her spoken utterances. The information mainly refers to the voice characteristic and the verbal content. This leads to two closely related technologies. One is speaker verification (SV) and the other is verbal information verification (VIV). Throughout this thesis, speaker authentication is studied for users who speak Cantonese. A SV system has been developed using state-of-the-art techniques with digit-based contexts. The universal background model (UBM) adaptation method are adopted and compared with the Cohort method. In VIV, many considerations in the process of constructing anti-models, e.g., the way of pooling subword units, the model structure and the model complexity, are discussed. A new technique is proposed to provide more reliable and effective anti-likelihood scores. Our method uses the Gaussian Mixture Model (GMM) instead of the conventional Hidden Markov Model (HMM) for anti-modeling at the subword level. Three methods for integrating SV and VIV systems are investigated. They are voting method, support vector machines (SVMs) and Gaussian-based classifier respectively. Experiments on 20 Cantonese speakers show that for SV the best result with equal error rate (EER) of 1.5% can be attained using the UBM adaptation. For VIV the experimental results indicate that the proposed GMM-based anti-
منابع مشابه
Speaker verification using verbal information verification for automatic enrolment
A conventional speaker verification (SV) system needs an enrollment session to collect the training data. In [I], we introduced a speaker authentication method called verbal information ven$cation (VIV) which verifies a speaker by verbal contents instead of speech characteristics. Such a system does not need an enrollment session. In this paper, VIV is combined with SV. We propose a system whic...
متن کاملUsing Exciting and Spectral Envelope Information and Matrix Quantization for Improvement of the Speaker Verification Systems
Speaker verification from talking a few words of sentences has many applications. Many methods as DTW, HMM, VQ and MQ can be used for speaker verification. We applied MQ for its precise, reliable and robust performance with computational simplicity. We also used pitch frequency and log gain contour for further improvement of the system performance.
متن کاملAutomatic verbal information verification for user authentication
Traditional speaker authentication focuses on speaker verification (SV) and speaker identification, which is accomplished by matching the speaker’s voice with his or her registered speech patterns. In this paper, we propose a new technique, verbal information verification (VIV), in which spoken utterances of a claimed speaker are verified against the key (usually confidential) information in th...
متن کاملUsing Exciting and Spectral Envelope Information and Matrix Quantization for Improvement of the Speaker Verification Systems
Speaker verification from talking a few words of sentences has many applications. Many methods as DTW, HMM, VQ and MQ can be used for speaker verification. We applied MQ for its precise, reliable and robust performance with computational simplicity. We also used pitch frequency and log gain contour for further improvement of the system performance.
متن کاملVerbal information verification
Traditionally, speaker authenticationhas focused on two categories of techniques: speaker verification and speaker identification. In this paper, we introduce a third category called verbal information verification (VIV) in which a claimed speaker’s utterances are verified against the key information in the speaker’s registered profile to decide whether the claimed identity should be accepted o...
متن کامل