Voice source cepstrum processing for speaker identification

نویسنده

  • Jón Guðnason
چکیده

Voice source analysis and modelling has played a key role in important speech applications such as speech recognition, speech synthesis and speaker recognition. This work presents a robust algorithm for glottal closure detection and a novel set of voice source features for speaker recognition. In the rst part of the dissertation the DYPSA algorithm is developed for detecting glottal closure instants (GCIs). It includes a detailed study of group delay functions and their application to the linear prediction residual; glottal closure candidate generation from the group delay function; cost function design with regards to the properties of the speech signal at the point of closure; and dynamic programming algorithm used to reject unlikely glottal closure candidates. The DYPSA algorithm is evaluated on a speech database that includes simultaneous laryngograph recording to provide reference glottal closures instants. The algorithm achieves a 95.7% identi cation rate with 0.71 ms timing error standard deviation. In the second part of the dissertation GCI detection allows the vocal tract transfer function to be estimated using closed-phase analysis. This is converted to cepstrum coe cients (VTCC) and subtracted from the mel-frequency cepstrum coe cients (MFCC) to derive a set of voice source cepstrum coe cients (VSCC). These are then used for speaker identi cation on the TIMIT database. We show that although a classi er using MFCC performs better than one using VSCC, the combination of the two gives a signi cant improvement in recognition rate, illustrat-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

طراحی یک روش آموزش ناموازی جدید برای تبدیل گفتار با عملکردی بهتر از آموزش موازی

Introduction: The art of voice mimicking by computers, has with the computer have been one of the most challenging topics of speech processing in recent years. The system of voice conversion has two sides. In one side, the speaker is the source that his or her voice has been changed for mimicking the target speaker’s voice (which is on the other side). Two methods of p...

متن کامل

A Novel Approach for Text-Independent Speaker Identification Using Artificial Neural Network

This article presents the implementation of Text Independent Speaker Identification system. It involves two parts“Speech Signal Processing” and “Artificial Neural Network”. The speech signal processing uses Mel Frequency Cepstral Coefficients (MFCC) acquisition algorithm that extracts features from the speech signal, which are actually the vectors of coefficients. The backpropagation algorithm ...

متن کامل

A Comparative Analysis of Speaker Identification on English and Hindi Database

In this paper a text-dependent speaker recognition method is presented by combining Mel frequency cepstrum coefficients (MFCC) and Euclidean distance. The robustness of this speaker identification method for different speaking language is analyzed in this paper. The speaker identification algorithm using English and Hindi Indian voice database (IVD) which contains sentences of data spoken is ac...

متن کامل

Cepstrum Based Voice Transformation Using ANN

The basic goal of the voice conversion system to mimics the characteristics of the target speaker voice by keeping the linguistic and paralinguistic information intact. The characteristics of a speaker in speech reflect at different level such as vocal tract, excitation and prosodic parameters. This propose work based on cepstrum which represents the vocal tract and excitation parameters of the...

متن کامل

MFCC Based Text-Dependent Speaker Identification Using BPNN

Speech processing has emerged as one of the important application area of digital signal processing. Various fields for research in speech processing are speech recognition, speaker recognition, speech synthesis, speech coding etc. Speaker recognition is one of the most useful and popular biometric recognition techniques in the world especially related to areas in which security is a major conc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007