Academia.eduAcademia.edu

Automatic Speaker Verification

description96 papers
group22 followers
lightbulbAbout this topic
Automatic Speaker Verification (ASV) is a biometric technology that uses voice recognition to verify an individual's identity based on their unique vocal characteristics. It involves analyzing speech patterns and features to confirm whether the speaker is who they claim to be, often employed in security and authentication systems.
lightbulbAbout this topic
Automatic Speaker Verification (ASV) is a biometric technology that uses voice recognition to verify an individual's identity based on their unique vocal characteristics. It involves analyzing speech patterns and features to confirm whether the speaker is who they claim to be, often employed in security and authentication systems.
Statistics of frame-level pitch have recently been used in speaker recognition systems with good results [1, 2, 3]. Although they convey useful long-term information about a speaker's distribution of f 0 values, such statistics fail to... more
For a few years, the problem of session variability in text- independent automatic speaker verification is being tackled ac- tively. A new paradigm based on a factor analysis model have successfully been applied for this task. While very... more
Environmental noise and reverberation conditions severely degrade the performance of forensic speaker verification. Robust feature extraction plays an important role in improving forensic speaker verification performance. This paper... more
This article presents a new approach using the discrimination power of Support Vectors Machines (SVM) in combination with Gaussian Mixture Models (GMM) for Automatic Speaker Verification (ASV). In this combination SVMs are applied in the... more
a b s t r a c t Speaker verification has recently been introduced to the forensic field as a new and complimentary approach to other forensic methods. With the advancement in speech communication technologies including voice over IP and... more
A systematic analysis of user-dependent performance variability in the context of automatic speaker verification was first studied by . Different categories of users were distinguished and were called by animal names such as sheep, goats,... more
This paper addresses the design and implementation of automatic speaker verification (ASV) systems. There is great interest in developing and increasing the performance of ASV applications, taking into account the advantages offered when... more
by Saeid Safavi and 
1 more
—Keeping track of the multiple passwords, PINs, memorable dates and other authentication details needed to gain remote access to accounts is one of modern life's less appealing challenges. The employment of a voice-based verification as a... more
Some preliminary investigations of within-speaker variations due to voluntary and induced speaking manners have been performed. The ultimate aim of the investigations was to suggest methods to take care of within-speaker variations in... more
It is well known that the speaker discriminative information is not equally distributed over the spectral domain. However, it is still not clear whether that distribution is altered when the speech is transmitted through telecommunication... more
In this paper we report the experiment carried out on recently collected speaker recognition database namely Arunachali Language Speech Database (ALS-DB)to make a comparative study on the performance of acoustic and prosodic features for... more
A Gaussian mixture model (GMM) is compared to a multiple binary classifier model (MBCM) in two speaker verification experiments conducted on telephone speech. The MBCM consists of 45 Moody-Darken radial basis function neural networks... more
Noise robustness of automatic speaker verification systems is crucial in real life applications. A study on the performance of several spectral subtraction-based speech enhancement techniques shows the poor performance of these algorithms... more
Alphanumeric passwords, identification via either chip cards or biometric parameters as iris pattern, fingerprints and voice are used to control access to confidential information and to restricted areas as well as to several types of... more
Download research papers for free!