Interfering noise severely degrades the performance of a speaker verification system. The Parallel Model Combination (PMC) technique is one of the most efficient techniques for dealing with such noise. Another method is to use features local in the frequency domain. Recently, Mel-Frequency Discrete Wavelet Coefficients (MFDWCs) [1, 2] were proposed as speech features local in frequency domain. In this paper, we discuss using PMC along with MFDWCs features to take advantage of both noise compensation and local features (MFDWCs) to decrease the effect of noise on speaker verification performance. We evaluate the performance of MFDWCs using the NIST 1998 speaker recognition and NOISEX-92 databases for various noise types and noise levels. We a...
In this work we improve the performance of a speaker verification system by matching the feature vec...
The standard approach to speaker verification is to extract cepstral features from the speech spectr...
Automatic speaker verification has many potential applications in security, surveillance and access ...
This thesis describes the development of a robust automatic speaker verification system (ASV) with s...
© 2013 IEEE. Environmental noise and reverberation conditions severely degrade the performance of fo...
Environmental noise and reverberation conditions severely degrade the performance of forensic speake...
Environmental noise and reverberation conditions severely degrade the performance of forensic speake...
Speaker recognition systems can typically attain high performance in ideal conditions. However, sign...
Abstract. Investigating Speaker Verification in real-world noisy environments, a novel feature extra...
Automatic speaker recognition may achieve remarkable performance in matched training and test condit...
The robustness of speaker identification system over additive noise channel is crucial for real-worl...
AbstractSpeaker identification system identifies the person by his/her speech sample. Speaker Identi...
This research paper presents a robust method for speaker verification in noisy environments. The noi...
The robustness of speaker verification systems is often degraded in real forensic applications, whic...
International audienceMost of the speech processing applications use triangular filters spaced in me...
In this work we improve the performance of a speaker verification system by matching the feature vec...
The standard approach to speaker verification is to extract cepstral features from the speech spectr...
Automatic speaker verification has many potential applications in security, surveillance and access ...
This thesis describes the development of a robust automatic speaker verification system (ASV) with s...
© 2013 IEEE. Environmental noise and reverberation conditions severely degrade the performance of fo...
Environmental noise and reverberation conditions severely degrade the performance of forensic speake...
Environmental noise and reverberation conditions severely degrade the performance of forensic speake...
Speaker recognition systems can typically attain high performance in ideal conditions. However, sign...
Abstract. Investigating Speaker Verification in real-world noisy environments, a novel feature extra...
Automatic speaker recognition may achieve remarkable performance in matched training and test condit...
The robustness of speaker identification system over additive noise channel is crucial for real-worl...
AbstractSpeaker identification system identifies the person by his/her speech sample. Speaker Identi...
This research paper presents a robust method for speaker verification in noisy environments. The noi...
The robustness of speaker verification systems is often degraded in real forensic applications, whic...
International audienceMost of the speech processing applications use triangular filters spaced in me...
In this work we improve the performance of a speaker verification system by matching the feature vec...
The standard approach to speaker verification is to extract cepstral features from the speech spectr...
Automatic speaker verification has many potential applications in security, surveillance and access ...