Speaker Recognition By Afshan Hina.

Slides:



Advertisements
Similar presentations
Presented by Erin Palmer. Speech processing is widely used today Can you think of some examples? Phone dialog systems (bank, Amtrak) Computers dictation.
Advertisements

Scott Settembre CSE 734 : Cyber Physical Spaces
Building an ASR using HTK CS4706
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Voice Biometric Overview for SfTelephony Meetup March 10, 2011 Dan Miller Opus Research.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
Natural Language Processing - Speech Processing -
4/25/2001ECE566 Philip Felber1 Speech Recognition A report of an Isolated Word experiment. By Philip Felber Illinois Institute of Technology April 25,
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
COMP 4060 Natural Language Processing Speech Processing.
Biometrics and Authentication Shivani Kirubanandan.
A PRESENTATION BY SHAMALEE DESHPANDE
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
Biometrics: Voice Recognition
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Knowledge Base approach for spoken digit recognition Vijetha Periyavaram.
Artificial Intelligence 2004 Speech & Natural Language Processing Natural Language Processing written text as input sentences (well-formed) Speech.
June 28th, 2004 BioSecure, SecurePhone 1 Automatic Speaker Verification : Technologies, Evaluations and Possible Future Gérard CHOLLET CNRS-LTCI, GET-ENST.
Supervisor: Dr. Eddie Jones Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification System for Security.
Douglas A. Reynolds, PhD Senior Member of Technical Staff
A Talking Elevator, WS2006 UdS, Speaker Recognition 1.
Juan Ortega 10/20/09 NTS490. Speaker recognition is the computing task of validating a user’s claimed identity using characteristics extracted from their.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Voice Recognition All Talk No Walk.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Jun-Won Suh Intelligent Electronic Systems Human and Systems Engineering Department of Electrical and Computer Engineering Speaker Verification System.
Artificial Intelligence 2004 Speech & Natural Language Processing Natural Language Processing written text as input sentences (well-formed) Speech.
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
Biometrics Authentication Technology
July Age and Gender Recognition from Speech Patterns Based on Supervised Non-Negative Matrix Factorization Mohamad Hasan Bahari Hugo Van hamme.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric Technologies
© 2013 by Larson Technical Services
ARTIFICIAL INTELLIGENCE FOR SPEECH RECOGNITION. Introduction What is Speech Recognition?  also known as automatic speech recognition or computer speech.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Speaker Verification System Middle Term Presentation Performed by: Barak Benita & Daniel Adler Instructor: Erez Sabag.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
By: Nicole Cappella. Why I chose Speech Recognition  Always interested me  Dr. Phil Show Manti Teo Girlfriend Hoax  Three separate voice analysts proved.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Speaker Recognition UNIT -6. Introduction  Speaker recognition is the process of automatically recognizing who is speaking on the basis of information.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Study on Deep Learning in Speaker Recognition Lantian Li CSLT / RIIT Tsinghua University May 26, 2016.
Speech Recognition
ARTIFICIAL NEURAL NETWORKS
FACE RECOGNITION TECHNOLOGY
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Ala’a Spaih Abeer Abu-Hantash Directed by Dr.Allam Mousa
Command Me Specification
Faculty of Science IT Department Lecturer: Raz Dara MA.
Hybrid Finger print recognition
A maximum likelihood estimation and training on the fly approach
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Speaker Recognition By Afshan Hina

Overview What is speaker recognition? Voice Pattern Categories of Speaker recognition. Verification versus identification Phases of speaker recognition Technology used Advantages and disadvantages Conclusion Commentary

Speaker Recognition Also referred as voiceprint recognition or voice recognition. Identifies sound. Such systems extract features from speech, model them and use them to recognize the person from his/her voice. Differs from speech recognition- where words are identified and not speaker. r  eh k ao g n ay  z       s  p  iy  ch "recognize speech" r  eh  k     ay     n  ay s     b  iy  ch” "wreck a nice beach"

Voice patterns uses the acoustic features of speech that have been found to differ between individuals. These acoustic patterns reflect both anatomy and learned behavioral patterns

Voice patterns But the data used in a voiceprint is a sound spectrogram, not a wave form. Spectrograms also use colors or shades of grey to represent the acoustical qualities of sound.

Categories Field text Text dependant Text independent Conversational.

Verification versus identification Speaker verification: If the speaker claims to be of a certain identity and the voice is used to verify this claim. Is usually used in applications which require secure access. Its a 1:1 match. Speaker identification: is the task of determining an unknown speaker's identity. It’s a 1:N match

Phases of speaker recognition Enrollment Phase: During enrollment the speaker's voice is recorded and typically a number of features are derived to form a voice print, template, or model. Test Phase: In the test phase (also called verification or identification phase) the speaker's voice is matched to the templates or models

Technologies used: frequency estimation hidden Markov models pattern matching algorithms neural networks matrix representation decision trees

Advantages Remote authentication over legacy phone line. Users do not have to remember passwords or pass phrases. Users do not have to go through separate process of verification.

Disadvantages Misspoken or misread prompted phrases. Extreme emotional states Time varying microphone placement. Poor or inconsistent room acoustics Channel mismatch Sickness Aging.

Conclusion speaker verification is a pervasive low cost way of including a biometric check. does not require specialized equipment to use the system. It provides a very strong binding between the presented credential (voice) and the user.

Commentary Although speaker verification performance can be affected by various human and external factors, it does provide a powerful authentication solution.