Becars: an Automatic Speaker Verification system

Slides:



Advertisements
Similar presentations
Spoken Language Interaction in Telecommunication at ENST/CNRS-LTCI Gérard CHOLLET, Richard CROCE, Dijana PETROVSKA-DELACRETAZ, Marc SIGELLE, Pascal VAILLANT,
Advertisements

Some activities on Biometrics at ENST/CNRS-LTCI
Projet Lean Entreprise 1 Michael Ballé Godefroy Beauvallet Izmir, 23/02/2004 Projet Lean Entreprise.
People Counting and Human Detection in a Challenging Situation Ya-Li Hou and Grantham K. H. Pang IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART.
Research & Development ICASSP' Analysis of Model Adaptation on Non-Native Speech for Multiple Accent Speech Recognition D. Jouvet & K. Bartkova France.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
SecurePhone Workshop - 24/25 June Speaking Faces Verification Kevin McTait Raphaël Blouet Gérard Chollet Silvia Colón Guido Aversano.
BioSec © 2004 BioSec Consortium 1 Biometrics & Security IST st BioSec Workshop Barcelona, June 28th, 2004 Multimodality Solutions: Major Advantages.
Speaker Recognition G. CHOLLET, G. GRAVIER,
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Speaker Adaptation for Vowel Classification
Dynamic Face Recognition Committee Machine Presented by Sunny Tang.
Language and Speaker Identification using Gaussian Mixture Model Prepare by Jacky Chau The Chinese University of Hong Kong 18th September, 2002.
Optimal Adaptation for Statistical Classifiers Xiao Li.
1 Cours parole du 9 Mars 2005 enseignants: Dr. Dijana Petrovska-Delacrétaz et Gérard Chollet Reconnaissance du locuteur 1.Introduction, Historique, Domaines.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
9.0 Speaker Variabilities: Adaption and Recognition References: of Huang 2. “ Maximum A Posteriori Estimation for Multivariate Gaussian Mixture.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.
National Smartcard Project Work Package 8 – Security Issues Report.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
Adaptation Techniques in Automatic Speech Recognition Tor André Myrvoll Telektronikk 99(2), Issue on Spoken Language Technology in Telecommunications,
Classification of place of articulation in unvoiced stops with spectro-temporal surface modeling V. Karjigi , P. Rao Dept. of Electrical Engineering,
Speaker Recognition By Afshan Hina.
An Introduction to Biometric Identity Verification
June 28th, 2004 BioSecure, SecurePhone 1 Automatic Speaker Verification : Technologies, Evaluations and Possible Future Gérard CHOLLET CNRS-LTCI, GET-ENST.
Douglas A. Reynolds, PhD Senior Member of Technical Staff
A Talking Elevator, WS2006 UdS, Speaker Recognition 1.
VBS Documentation and Implementation The full standard initiative is located at Quick description Standard manual.
Chapter 14 Speaker Recognition 14.1 Introduction to speaker recognition 14.2 The basic problems for speaker recognition 14.3 Approaches and systems 14.4.
International Conference on Intelligent and Advanced Systems 2007 Chee-Ming Ting Sh-Hussain Salleh Tian-Swee Tan A. K. Ariff. Jain-De,Lee.
Supervisor: Dr. Eddie Jones Co-supervisor: Dr Martin Glavin Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification.
With Jim Mollé Learn iT! Computer Software Training.
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Jun-Won Suh Intelligent Electronic Systems Human and Systems Engineering Department of Electrical and Computer Engineering Speaker Verification System.
Dijana Petrovska-Delacrétaz 1 Asmaa el Hannani 1 Gérard Chollet 2 1: DIVA Group, University of Fribourg 2: GET-ENST, CNRS-LTCI,
1 Bioinformatic Voice Applications: Speaker Recognition and Verification Andrew Rosenberg Biometric Seminar Day August 23, 2010.
Secure contracts signed by mobile Phone IST Jacques Koreman, NTNU Andrew Morris, Spinvox International Workshop on Verbal and Nonverbal Communiation.
Speaker Authentication Qi Li and Biing-Hwang Juang, Pattern Recognition in Speech and Language Processing, Chap 7 Reporter : Chang Chih Hao.
Dimension-Decoupled Gaussian Mixture Model for Short Utterance Speaker Recognition Thilo Stadelmann, Bernd Freisleben, Ralph Ewerth University of Marburg,
Speaker Verification Speaker verification uses voice as a biometric to determine the authenticity of a user. Speaker verification systems consist of two.
A Baseline System for Speaker Recognition C. Mokbel, H. Greige, R. Zantout, H. Abi Akl A. Ghaoui, J. Chalhoub, R. Bayeh University Of Balamand - ELISA.
Nick Wang, 25 Oct Speaker identification and verification using EigenVoices O. Thyes, R. Kuhn, P. Nguyen, and J.-C. Junqua in ICSLP2000 Presented.
Singer similarity / identification Francois Thibault MUMT 614B McGill University.
Variational Bayesian Methods for Audio Indexing
Speech Recognition with CMU Sphinx Srikar Nadipally Hareesh Lingareddy.
Chapter 7 Speech Recognition Framework  7.1 The main form and application of speech recognition  7.2 The main factors of speech recognition  7.3 The.
Speaker Verification Using Adapted GMM Presented by CWJ 2000/8/16.
Statistical Models for Automatic Speech Recognition Lukáš Burget.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
1 Authentication Technologies Authentication Mechanisms –Something you know –Something you have –Something you are Features –Authenticator & Base secret.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Flexible Speaker Adaptation using Maximum Likelihood Linear Regression Authors: C. J. Leggetter P. C. Woodland Presenter: 陳亮宇 Proc. ARPA Spoken Language.
A Tutorial on Speaker Verification First A. Author, Second B. Author, and Third C. Author.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
ARTIFICIAL NEURAL NETWORKS
Speech Technology Center Solutions
Statistical Models for Automatic Speech Recognition
Voice conversion using Artificial Neural Networks
LTI Student Research Symposium 2004 Antoine Raux
Presentation for EEL6586 Automatic Speech Processing
Statistical Models for Automatic Speech Recognition
Sfax University, Tunisia
Faculty of Science IT Department Lecturer: Raz Dara MA.
10701 Recitation Pengtao Xie
John H.L. Hansen & Taufiq Al Babba Hasan
A maximum likelihood estimation and training on the fly approach
SNR-Invariant PLDA Modeling for Robust Speaker Verification
Presentation transcript:

Becars: an Automatic Speaker Verification system Chafic Mokbel(1) Raphaël Blouet(2) Eduardo Sanchez Soto(2) Gérard Chollet(2) {blouet,chollet,esanchez}@tsi.enst.fr chafic.mokbel@balamand.edu.lb University of Balamand, El Koura, Libanon (2) École Nationale Supérieure des Télécommunications, Paris, France

Outline Context and aim of the work Automatic identification Biometric identification Automatic Speaker Verification Applications State of the art – research directions Conclusion / discussion

Context and aim of the work Collaboration between the University of Balamamand and l’ENST in the context of the Cedar project a French-Libanese cooperation framework Setting up and distribution of a gnu software for Automatic speaker Verification Participation of both sites to the NIST 2004 speaker verification evaluation Standard in evaluation of state-of-the-art performances

Automatic identification Why ? Secure access to sensitive data, offices or services Automatic adaptation of softwares or services to clients… How ? [S. Liu and M. Silverman 2001.] “Something that you have” : keys, cards… “Something that you know” : PIN code, password… “Something that you are” : Biometric Authentication

Biometric identification Something that you know Something that you have Biometry: something that you are SECURED SPACE Bla-bla

Automatic Speaker Verification Verification System Claimed Identity Acceptation Rejection Speech processing Biometric Technology

State of the art – research directions (1) Hypothesis Testing: Y, Acoustic Parameters Space: Mel Filter Bank Cepstal Coefficient (mfcc). Speaker Modelization : Gaussian Mixture Model (GMM), [Reynolds, 1994] Acceptation Rejection

Gaussians Mixture Model Parameters :

State of the art – research directions (3) world model, speaker independent, train with all available speaker, using the algorithm EM . client model, Obtained as an adaptation of , MAP with a prior distribution MLLR with a transform function Unified approach

Adaptation Degré de liberté variable  Partitionnement variable des distributions Après chaque étape E de l’EM  partitionnement donnant une quantité de données suffisante par classe 12 9 17 6 23 21 33 56

Hierarchical - MLLR adapted System

Conclusion / discussion Becars provides a state-of –the-art software for GMM parameters estimation Speed up development and research purposes of new site wishing to participate to the NIST evaluation Enhance software quality by users’ feedback