Speaker authentication system using soft computing approaches
Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-L...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2005
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf http://irep.iium.edu.my/38183/ http://www.sciencedirect.com/science/article/pii/S0925231205000421# |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
Summary: | Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental
results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources. |
---|