Design of a speaker recognition system
In recent years, various cryptosystems have appeared from the laboratory to the market. Human nature as a unique characteristic for different people has been utilized in these various cryptosystems to do the security work. For example, fingerprint unlocking has been commonly used in cell phones and...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/78230 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-78230 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-782302023-07-07T17:35:34Z Design of a speaker recognition system Zhao, Guangye Ng Boon Poh School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing In recent years, various cryptosystems have appeared from the laboratory to the market. Human nature as a unique characteristic for different people has been utilized in these various cryptosystems to do the security work. For example, fingerprint unlocking has been commonly used in cell phones and controlling access to the door. Iris recognition is also a new and developing technology used in an upscale environment. Another technology called speaker recognition uses the speech of different people to achieve identification and verification in the security system. In this report, a speaker recognition system is built to recognize which person is speaking in a record of speech and whether this speaker is in the database of authority or not. There are two main parts of this system: The first part is the speech feature extraction system. The technology called Mel-frequency cepstrum coefficients (MFCC) is used to extract the unique features in the speech for different speakers. The features represent for different people will be stored in the database. The second one is speech feature matching system, using vector quantization (VQ) to compare the features of the testing speaker with the all the speaker features in the database and determine whether this speaker is in the database or not. After these two parts, a complete speaker recognition system will be constructed and can be used to achieve identification and verification in a security system. Bachelor of Engineering (Electrical and Electronic Engineering) 2019-06-13T08:03:06Z 2019-06-13T08:03:06Z 2019 Final Year Project (FYP) http://hdl.handle.net/10356/78230 en Nanyang Technological University 68 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering::Electronic systems::Signal processing Zhao, Guangye Design of a speaker recognition system |
description |
In recent years, various cryptosystems have appeared from the laboratory to the market. Human nature as a unique characteristic for different people has been utilized in these various cryptosystems to do the security work. For example, fingerprint unlocking has been commonly used in cell phones and controlling access to the door. Iris recognition is also a new and developing technology used in an upscale environment. Another technology called speaker recognition uses the speech of different people to achieve identification and verification in the security system. In this report, a speaker recognition system is built to recognize which person is speaking in a record of speech and whether this speaker is in the database of authority or not. There are two main parts of this system: The first part is the speech feature extraction system. The technology called Mel-frequency cepstrum coefficients (MFCC) is used to extract the unique features in the speech for different speakers. The features represent for different people will be stored in the database. The second one is speech feature matching system, using vector quantization (VQ) to compare the features of the testing speaker with the all the speaker features in the database and determine whether this speaker is in the database or not. After these two parts, a complete speaker recognition system will be constructed and can be used to achieve identification and verification in a security system. |
author2 |
Ng Boon Poh |
author_facet |
Ng Boon Poh Zhao, Guangye |
format |
Final Year Project |
author |
Zhao, Guangye |
author_sort |
Zhao, Guangye |
title |
Design of a speaker recognition system |
title_short |
Design of a speaker recognition system |
title_full |
Design of a speaker recognition system |
title_fullStr |
Design of a speaker recognition system |
title_full_unstemmed |
Design of a speaker recognition system |
title_sort |
design of a speaker recognition system |
publishDate |
2019 |
url |
http://hdl.handle.net/10356/78230 |
_version_ |
1772826272449167360 |