Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources
Background: Speaker recognition systems plays a pivotal role in the field of forensics, security and...
xvii, 158 leaves : ill. (some col.) ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P EIE 2005 YiuSp...
This paper proposes a text-dependent (fixed-text) speaker verification system which uses different t...
Speaker recognizer may be employed as part of a security system requiring user authentication. Mostl...
Speaker verification is the process of authenticating a person’s identity. Most of the available spe...
In this thesis, I suggest a way of using voice to make up for the weak points in current security sy...
Speaker recognition is defined as to make sure that if the person is the same person he claims to be...
This paper presents a technique using artificial neural networks (ANNs) for speaker identification t...
Speaker Recognition is a process by which a machine authenticates the claimed of a person from voice...
As humans, we develop the ability to recognise people by their voice from an early age. Getting comp...
\Lambda, sundarg.iitm.ernet.in Abstract In this paper, we propose two neural network-based approache...
Speaker recognition is a technique of identifying the person talking to a machine using the voice fe...
[[abstract]]This paper describes how techniques from the discipline of neuro-fuzzy and soft computin...
Data verification systems evolve towards a more natural system using biometric media. In daily inter...
Authentication is becoming ever more important in computer-based applications because the amount of ...
Background: Speaker recognition systems plays a pivotal role in the field of forensics, security and...
xvii, 158 leaves : ill. (some col.) ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P EIE 2005 YiuSp...
This paper proposes a text-dependent (fixed-text) speaker verification system which uses different t...
Speaker recognizer may be employed as part of a security system requiring user authentication. Mostl...
Speaker verification is the process of authenticating a person’s identity. Most of the available spe...
In this thesis, I suggest a way of using voice to make up for the weak points in current security sy...
Speaker recognition is defined as to make sure that if the person is the same person he claims to be...
This paper presents a technique using artificial neural networks (ANNs) for speaker identification t...
Speaker Recognition is a process by which a machine authenticates the claimed of a person from voice...
As humans, we develop the ability to recognise people by their voice from an early age. Getting comp...
\Lambda, sundarg.iitm.ernet.in Abstract In this paper, we propose two neural network-based approache...
Speaker recognition is a technique of identifying the person talking to a machine using the voice fe...
[[abstract]]This paper describes how techniques from the discipline of neuro-fuzzy and soft computin...
Data verification systems evolve towards a more natural system using biometric media. In daily inter...
Authentication is becoming ever more important in computer-based applications because the amount of ...
Background: Speaker recognition systems plays a pivotal role in the field of forensics, security and...
xvii, 158 leaves : ill. (some col.) ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P EIE 2005 YiuSp...
This paper proposes a text-dependent (fixed-text) speaker verification system which uses different t...