Sfax University, Tunisia

Slides:



Advertisements
Similar presentations
Biometrics Kayla Burke.
Advertisements

Vineel Pratap Girish Govind Abhilash Veeragouni. Human listeners are capable of extracting information from the acoustic signal beyond just the linguistic.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Language and Speaker Identification using Gaussian Mixture Model Prepare by Jacky Chau The Chinese University of Hong Kong 18th September, 2002.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
Advisor: Prof. Tony Jebara
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Toshiba Update 04/09/2006 Data-Driven Prosody and Voice Quality Generation for Emotional Speech Zeynep Inanoglu & Steve Young Machine Intelligence Lab.
Karthiknathan Srinivasan Sanchit Aggarwal
Age and Gender Classification using Modulation Cepstrum Jitendra Ajmera (presented by Christian Müller) Speaker Odyssey 2008.
Classification of place of articulation in unvoiced stops with spectro-temporal surface modeling V. Karjigi , P. Rao Dept. of Electrical Engineering,
June 28th, 2004 BioSecure, SecurePhone 1 Automatic Speaker Verification : Technologies, Evaluations and Possible Future Gérard CHOLLET CNRS-LTCI, GET-ENST.
VBS Documentation and Implementation The full standard initiative is located at Quick description Standard manual.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
International Conference on Intelligent and Advanced Systems 2007 Chee-Ming Ting Sh-Hussain Salleh Tian-Swee Tan A. K. Ariff. Jain-De,Lee.
Supervisor: Dr. Eddie Jones Co-supervisor: Dr Martin Glavin Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification.
Multimodal Information Analysis for Emotion Recognition
Overview of Part I, CMSC5707 Advanced Topics in Artificial Intelligence KH Wong (6 weeks) Audio signal processing – Signals in time & frequency domains.
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Jun-Won Suh Intelligent Electronic Systems Human and Systems Engineering Department of Electrical and Computer Engineering Speaker Verification System.
Recognition of Speech Using Representation in High-Dimensional Spaces University of Washington, Seattle, WA AT&T Labs (Retd), Florham Park, NJ Bishnu Atal.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Speaker Verification Speaker verification uses voice as a biometric to determine the authenticity of a user. Speaker verification systems consist of two.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Singer similarity / identification Francois Thibault MUMT 614B McGill University.
July Age and Gender Recognition from Speech Patterns Based on Supervised Non-Negative Matrix Factorization Mohamad Hasan Bahari Hugo Van hamme.
BIOMETRICS THE MAN MACHINE INTERFACE
Speaker Identification by Combining MFCC and Phase Information Longbiao Wang (Nagaoka University of Technologyh, Japan) Seiichi Nakagawa (Toyohashi University.
Biometric Technologies
Performance Comparison of Speaker and Emotion Recognition
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
RCC-Mean Subtraction Robust Feature and Compare Various Feature based Methods for Robust Speech Recognition in presence of Telephone Noise Amin Fazel Sharif.
1 Voicing Features Horacio Franco, Martin Graciarena Andreas Stolcke, Dimitra Vergyri, Jing Zheng STAR Lab. SRI International.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Study on Deep Learning in Speaker Recognition Lantian Li CSLT / RIIT Tsinghua University May 26, 2016.
Detection Of Anger In Telephone Speech Using Support Vector Machine and Gaussian Mixture Model Prepared By : Siti Marahaini Binti Mahamood.
Biometrics Security in Banking Systems Image processing in ATM
Diane DiLorenzo Cosc 101 section 7
ARTIFICIAL NEURAL NETWORKS
Multimodal Biometric Security
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
Ala’a Spaih Abeer Abu-Hantash Directed by Dr.Allam Mousa
Decision Making Based on Cohort Scores for
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
John H.L. Hansen & Taufiq Al Babba Hasan
A maximum likelihood estimation and training on the fly approach
Emre Yılmaz, Henk van den Heuvel and David A. van Leeuwen
Presentation transcript:

Sfax University, Tunisia National Engineering School of Sfax Advanced Technologies for Medicine and Signals Research Unit Efficient parameterization for Automatic speaker recognition using Support Vector Machines Today I will present my paper entitled Rania Chakroun Mondher Frikha Leila beltaifa zouari

1. 2. 3. 4. Outline Introduction System Overview Experimental Results The outline of my presentation is orgnized as follows: **First, I will present the context of this work with an introduction about speaker recognition **Second, I will give an overview of the systems developped **Then, I will detail our Experimental Results. ** and Finally, I will give our Conclusions & Future Work Let us begin with the introduction Conclusions & Future Work 4. Chakroun Rania ISDA 2015

Motivation Individuals need to be identified in sensitive domains and applications such as Access control Research and supervision individuals Border control Military intelligence (suspects' identification) …. that’s why biometric technology is developed to improve security and reduce fraud Instead of passwords, PINs or signatures (which can be stolen, forgotten or forged) Chakroun Rania ISDA 2015

Motivation There are many biometric modalities Fingerprint Palmprint Hand Geometry Face Iris Retina Scan DNA Signatures Voiceprint …. Which is the modality adopted in this work Chakroun Rania ISDA 2015

What language was spoken? Extracting Information from Speech Speech conveys many Information Where is he/she from? What language was spoken? What was spoken? Accent Recognition Language Recognition Speech Recognition Emotion Recognition Gender Recognition Speaker Recognition Positive? Negative? Happy? Sad? Male or Female? Who spoke? Chakroun Rania ISDA 2015

Speaker Recognition applications The applications of speaker recognition technology are quite varied Authentication Banking application. Law Enforcemet Proving the identity of a recorded voice can help to convict a criminal or discharge an innocent in court. Surveillance. Electronic eavesdropping of telephone and radio conversations. Chakroun Rania ISDA 2015

Problems Speaker recognition area suffers from many problems Inter-Speaker Variability Intra-Speaker Variability Spoofing attacks Learning and testing data duration …etc. Speaker reco applications share many problems Chakroun Rania ISDA 2015

Objective Determine whom is talking from set of known voices No identity claim from user Limited data duration which information we use ? how can we exploit them ? In this work, we want to Determine ……………Knowing that No identity Chakroun Rania ISDA 2015

1. 2. 3. 4. Outline Introduction System Overview Experimental Results Let us pass in Conclusions & Future Work 4. Chakroun Rania ISDA 2015

Speaker Recognition System Speaker recognition systems have 2 main parts Which characteristics? Which approaches? Feature Extraction Learning algorithm Speaker Recognition Systems havo 2 main parts These systems use on which approaches they depend? the Feature Extraction Recognition algorithm Decision Chakroun Rania ISDA 2015

Characteristics & approaches MFCC LFCC LPCC PLP,… … Approaches Gaussian Mixture Models (GMM) Support Vector Machines (SVM) We find many Characteristics We find different Approaches where the most successful are Chakroun Rania ISDA 2015

1. 2. 3. 4. Outline Introduction System Overview Experimental Results Conclusions & Future Work 4. Chakroun Rania ISDA 2015

Database TIMIT Database 64 American speakers From 8 dialect region (« dr1 » to « dr8 ») With 10 utterances/ speaker Average duration of 3.28 s /utterance Dialect Region code Dialect Region DR1 New England DR2 Northern DR3 North Midland DR4 South Midland DR5 Southern DR6 New York City DR7 Western DR8 Army brat Twenty eight Chakroun Rania ISDA 2015

Speaker Recognition System Which characteristics we use? Which approaches we use? Feature Extraction Learning algorithm So Which characteristics we use? And Which approaches we shoose to use? Feature Extraction Recognition algorithm Decision Chakroun Rania ISDA 2015

Characteristics & approaches System based on Support Vector Machine (SVM) Characteristics First System based on Mel Frequency Cepstral Coefficients (MFCC) 19 MFCC+Delta+double delta (60-dimensional vectors) Second proposed system based on reduced MFCC features 12 MFCC+Delta+double delta (39-dimensional vectors) Third proposed system based new cepstral features Cepstral Mean and Variance Normalization (CMVN) 39-dimensional vectors We shoose the approach based We develop Chakroun Rania ISDA 2015

Results best result 98,43 % best result 100 % best result 100 % Speaker identification rates with SVM-based systems with 8 utterances for training and 2 utterances for the test using RBF and Linear kernels best result 98,43 % best result 100 % best result 100 % Chakroun Rania ISDA 2015

Results best result 96,88 % best result 98,43 % best result 100 % Speaker identification rates with SVM-based systems with 3 utterances for training and 2 utterances for the test using RBF and Linear kernels best result 96,88 % best result 98,43 % best result 100 % Chakroun Rania ISDA 2015

1. 2. 3. 4. Outline Introduction System Overview Experimental Results Conclusions & Future Work 4. Chakroun Rania ISDA 2015

Conclusions & Future Work Speaker recognition technology is a viable technique currently available for applications. A new approach based on SVM using new low-dimensional CMVN feature vectors is proposed and gives significant improvements for Speaker identification. Future work will focus on further experiments to test the new approach with new algorithms and/or features. Research will focus on using speaker identification for more unconstrained and uncontrolled situations. Chakroun Rania ISDA 2015

Thank you for your attention