Loading…

Improvement of a speaker authentication system through MLP's post-processing

Speaker verification and utterance verification are examples of techniques that can be used for speaker authentication purposes. Speaker verification consists of accepting or rejecting the claimed identity of a speaker by processing samples of his/her voice. Usually, these systems are based on HMM m...

Full description

Saved in:
Bibliographic Details
Main Authors: Rodriguez-Linares, L., Garcia-Mateo, C., Alba-Castro, J.L.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Speaker verification and utterance verification are examples of techniques that can be used for speaker authentication purposes. Speaker verification consists of accepting or rejecting the claimed identity of a speaker by processing samples of his/her voice. Usually, these systems are based on HMM models that try to represent the characteristics of the talkers' vocal tracts. Utterance verification systems make use of a set of speaker-independent speech models to recognize a certain utterance. If the utterances consist of passwords, this can be used for identity verification purposes. Up to now, both techniques have been used separately. In this paper, we show that combining these two sources of information using neural networks outperforms both the individual classifiers and other proposed methods for combination.
ISSN:1089-3555
2379-2329
DOI:10.1109/NNSP.2001.943150