Recorded speech signals convey information not only for the speakers' identity and the spoken language, but also for the acquisition devices used for their recording. Therefore, it is reasonable to perform acquisition device identification by analyzing the recorded speech signal. To this end, recording-level spectral, cepstral, and fusion of spectral and cepstral features are employed as suitable representations for device identification. The feature vectors extracted from the training speech recordings are used to form overcomplete dictionaries for the devices. Each test feature vector is represented as a linear combination of all the dictionary columns (i.e., atoms). Since the dimensionality of the feature vectors is much smaller than the...
In this paper we present a general approach to identifying non-linguistic speech features from the r...
Abstract—We address reducing the mismatch between training and testing conditions for hands-free in-...
Technologies that exploit biometrics can potentially be applied to the identification and verificati...
Speech signals convey various pieces of information such as the identity of its speaker, the languag...
Forensic techniques can be used to identify the source of a digital data. This is also known as fore...
With the widespread availability of cell-phone recording devices, source cell-phone identification h...
In a recent study, we have introduced the problem of identifying cell-phones using recorded speech a...
This paper discusses the application of speech signals that convey various pieces of information suc...
The ability to identify mobile phones through their built-in components has been demonstrated in the...
Abstract In this study, a speaker identification system is considered consisting of a feature extrac...
This paper presents an experimental implementation of a low-complexity speaker recognition algorithm...
As the increasing popularity of integrating hands-free telephony on mobile portable devices and the ...
To improve the performance of the telephone-line speaker identification system, we take in use three...
The collection of telephone databases, for training speech recognizers, is a time consuming and cost...
Benchmarking the performance for telephone-network-based speech recognition systems i hampered bytwo...
In this paper we present a general approach to identifying non-linguistic speech features from the r...
Abstract—We address reducing the mismatch between training and testing conditions for hands-free in-...
Technologies that exploit biometrics can potentially be applied to the identification and verificati...
Speech signals convey various pieces of information such as the identity of its speaker, the languag...
Forensic techniques can be used to identify the source of a digital data. This is also known as fore...
With the widespread availability of cell-phone recording devices, source cell-phone identification h...
In a recent study, we have introduced the problem of identifying cell-phones using recorded speech a...
This paper discusses the application of speech signals that convey various pieces of information suc...
The ability to identify mobile phones through their built-in components has been demonstrated in the...
Abstract In this study, a speaker identification system is considered consisting of a feature extrac...
This paper presents an experimental implementation of a low-complexity speaker recognition algorithm...
As the increasing popularity of integrating hands-free telephony on mobile portable devices and the ...
To improve the performance of the telephone-line speaker identification system, we take in use three...
The collection of telephone databases, for training speech recognizers, is a time consuming and cost...
Benchmarking the performance for telephone-network-based speech recognition systems i hampered bytwo...
In this paper we present a general approach to identifying non-linguistic speech features from the r...
Abstract—We address reducing the mismatch between training and testing conditions for hands-free in-...
Technologies that exploit biometrics can potentially be applied to the identification and verificati...