Effectiveness in the Realisation of Speaker Authentication

2019 International Carnahan Conference on Security Technology (ICCST)(2019)

引用 1|浏览4
暂无评分
摘要
An important consideration for the deployment of speaker recognition in authentication applications is the approach to the formation of training and testing utterances. Whilst defining this for a specific scenario is influenced by the associated requirements and conditions, the process can be further guided through the establishment of the relative usefulness of alternative frameworks for composing the training and testing material. In this regard, the present paper provides an analysis of the effects, on the speaker recognition accuracy, of various bases for the formation of the training and testing data. The experimental investigations are conducted based on the use of digit utterances taken from the XM2VTS database. The paper presents a detailed description of the individual approaches considered and discusses the experimental results obtained in different cases.
更多
查看译文
关键词
Speaker Authentication,Biometric Applications,Speaker Recognition
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要