Automatic speaker recognition full report
#1

Automatic speaker recognition



.docx   Automatic speaker recognition.docx (Size: 2.1 MB / Downloads: 6)


INTRODUCTION

Automatic speaker recognition has basically two classifications: speaker recognition and speaker identification and it is the method of automatically identifying who is speaking on the basis of individual information integrated in speech waves. Speaker recognition is widely applicable in use of speaker’s voice to verify their identity and control access to services such as banking by telephone, database access services, voice dialing telephone shopping, information services, voice mail, security control for secret information areas, and remote access to computer AT and T and TI with Sprint have started field tests and actual application of speaker recognition technology; many customers are already being used by Sprint’s Voice Phone Card. Speaker recognition technology is the most potential technology to create new services that will make our everyday lives more secured.



LITERATURE SURVEY

In late 1940s, the US Defense proposed Automatic Translation Machine. The project failed, but sparked the research at MIT, CMU, commercial institutions. The first attempts for automatic speaker recognition were made in the 1960s, one decade later than that for automatic speech recognition. Pruzansky at Bell Labs [1] was among the first to initiate research by using filter banks and correlating two digital spectrograms for a similarity measure. Pruzansky and Mathews [2] improved upon this technique; and, Li et al. [3] further developed it by using linear discriminators. Doddington at Texas Instruments (TI) [4] replaced filter banks by formant analysis. Intra-speaker variability of features, one of the most serious problems in speaker recognition, was intensively investigated by Endres et al. [5] and Furui [6]. In 1962, IBM introduced Shoebox.


PROBLEM DEFINITION

Speaker recognition involves two tasks: identification and verification, as shown in Figure 3.1. In identification, the goal is to determine which voice in a known group of voices best matches the speaker. In verification, the goal is to determine if the speaker is who he or she claims to be.


THE SPEECH SIGNAL

Human communication is to be seen as a comprehensive diagram of the process from speech production to speech perception between the talker and listener, See Figure 4.1. Five different elements, A. Speech formulation, B. Human vocal mechanism, C. Acoustic air, D. Perception of the ear, E. Speech comprehension. The first element (A. Speech formulation) is associated with the formulation of the speech signal in the talker’s mind. This formulation is used by the human vocal mechanism (B. Human vocal mechanism) to produce the actual speech waveform. The waveform is transferred via the air (C. Acoustic air) to the listener.




Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: speech signal analysis and speaker recognition by signal processing full seminar report in ppt format, source code of automatic speaker recognition text independent system in java language, automatic speaker recognition text independent system, project report on speaker recognition, speaker recognition cod, speaker verification with speech recognition, speaker recognition projects,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ATM WITH AN EYE FULL REPORT seminar details 1 5,778 09-07-2016, 12:36 PM
Last Post: seminar report asees
  FACE RECOGNITION BASED ON OPENCV(USING PRINCIPAL COMPONENT ANALYSIS) project uploader 2 1,027 12-02-2016, 02:14 PM
Last Post: seminar report asees
  Authentication Schemes for Session Passwords using Color and Images full report seminar details 1 2,837 29-07-2015, 02:27 PM
Last Post: Guest
  AUTOMATIC PHASE CHANGER full report seminar paper 3 3,543 27-03-2015, 10:06 AM
Last Post: seminar report asees
  Wireless LAN Security FULL REPORT seminar details 3 5,128 06-11-2014, 09:23 PM
Last Post: seminar report asees
  BRAIN FINGERPRINTING full report project uploader 2 10,782 24-10-2014, 11:49 PM
Last Post: jaseela123d
  TERRORISM full report project uploader 2 2,278 08-05-2013, 10:17 AM
Last Post: computer topic
  MEMRISTOR FULL REPORT seminar details 1 3,446 25-01-2013, 12:02 PM
Last Post: seminar details
  Windows 8 FULL REPORT seminar paper 3 4,478 24-01-2013, 12:34 PM
Last Post: seminar details
  FIREWIRE full report seminar details 1 2,446 11-01-2013, 10:18 AM
Last Post: seminar details

Forum Jump: