Effectiveness in the Realisation of Speaker Authentication

Research output: Chapter in Book/Report/Conference proceedingConference contribution

52 Downloads (Pure)

Abstract

An important consideration for the deployment of speaker recognition in authentication applications is the approach to the formation of training and testing utterances . Whilst defining this for a specific scenario is influenced by the associated requirements and conditions, the process can be further guided through the establishment of the relative usefulness of alternative frameworks for composing the training and testing material. In this regard, the present paper provides an analysis of the effects, on the speaker recognition accuracy, of various bases for the formation of the training and testing data. The experimental investigations are conducted based on the use of digit utterances taken from the XM2VTS database. The paper presents a detailed description of the individual approaches considered and discusses the experimental results obtained in different cases.
Original languageEnglish
Title of host publication2019 International Carnahan Conference on Security Technology (ICCST), CHENNAI, India, 2019
Subtitle of host publicationIEEE ICCST 2019
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1-5
Number of pages5
ISBN (Electronic)9781728115764
ISBN (Print)978-1-7281-1575-7
DOIs
Publication statusPublished - 31 Oct 2019
EventThe IEEE (53rd) International Carnahan Conference on Security Technology - Anna University, Chennai, India
Duration: 1 Oct 20193 Oct 2019
http://www.mitindia.edu/ICCST2019/

Publication series

NameProceedings - International Carnahan Conference on Security Technology
Volume2019-October
ISSN (Print)1071-6572

Conference

ConferenceThe IEEE (53rd) International Carnahan Conference on Security Technology
Country/TerritoryIndia
CityChennai
Period1/10/193/10/19
Internet address

Keywords

  • Biometric Applications
  • Speaker Authentication
  • Speaker Recognition

Fingerprint

Dive into the research topics of 'Effectiveness in the Realisation of Speaker Authentication'. Together they form a unique fingerprint.

Cite this