In this thesis, I suggest a way of using voice to make up for the weak points in current security systems and downsize the load of users by affording natural and convenient speaker verification. This thesis contains the basic technology to build a practical speaker verification system using neural networks and research for implementing the system, which guarantees reliability. Firstly, this thesis will focus on making up for the weak points in current existing methods by applying the characteristics of neural networks like learning ability, parallel processing ability and adaptability. And this thesis will advance to characteristic presentation and extracting method, technique of dividing voice signal, research on new neural network model t...
In this paper we investigate the use of deep neural networks (DNNs) for a small footprint text-depen...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
The system on the computer can make everything run quickly and efficiently, so that it becomes a too...
Speaker recognizer may be employed as part of a security system requiring user authentication. Mostl...
Speaker authentication has been developed rapidly in the last few decades. This research work attemp...
xvii, 158 leaves : ill. (some col.) ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P EIE 2005 YiuSp...
Data verification systems evolve towards a more natural system using biometric media. In daily inter...
Speaker verification is the process of authenticating a person’s identity. Most of the available spe...
In this paper, wavelet transform technique and neural network is used for development of Speak...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
This paper presents an overview of a state-of-the-art text-independent speaker verification system. ...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
\Lambda, sundarg.iitm.ernet.in Abstract In this paper, we propose two neural network-based approache...
In this paper we investigate the use of deep neural networks (DNNs) for a small footprint text-depen...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
The system on the computer can make everything run quickly and efficiently, so that it becomes a too...
Speaker recognizer may be employed as part of a security system requiring user authentication. Mostl...
Speaker authentication has been developed rapidly in the last few decades. This research work attemp...
xvii, 158 leaves : ill. (some col.) ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P EIE 2005 YiuSp...
Data verification systems evolve towards a more natural system using biometric media. In daily inter...
Speaker verification is the process of authenticating a person’s identity. Most of the available spe...
In this paper, wavelet transform technique and neural network is used for development of Speak...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
This paper presents an overview of a state-of-the-art text-independent speaker verification system. ...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
\Lambda, sundarg.iitm.ernet.in Abstract In this paper, we propose two neural network-based approache...
In this paper we investigate the use of deep neural networks (DNNs) for a small footprint text-depen...
International audienceThis paper presents an overview of a state-of-the-art text-independent speaker...
The system on the computer can make everything run quickly and efficiently, so that it becomes a too...