[go: up one dir, main page]

Chen et al., 2016 - Google Patents

Forensic identification for electronic disguised voice based on supervector and statistical analysis

Chen et al., 2016

Document ID
1912407232728242777
Author
Chen Q
Li J
Li Y
Publication year
Publication venue
2016 Conference of The Oriental Chapter of International Committee for Coordination and Standardization of Speech Databases and Assessment Techniques (O-COCOSDA)

External Links

Snippet

This paper proposed a novel algorithm for forensic identification of electronic disguised voice based on supervector and statistical analysis. The supervector was stacked by mixtures of mean vector of Gaussian mixture model. SVM classifier was used to identify …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/06Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
    • G10L15/065Adaptation
    • G10L15/07Adaptation to the speaker
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/04Training, enrolment or model building
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/06Decision making techniques; Pattern matching strategies
    • G10L17/08Use of distortion metrics or a particular distance between probe pattern and reference templates

Similar Documents

Publication Publication Date Title
Sahidullah et al. Introduction to voice presentation attack detection and recent advances
Chen et al. ResNet and Model Fusion for Automatic Spoofing Detection.
Hanifa et al. A review on speaker recognition: Technology and challenges
Tan et al. A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction
Huang et al. Audio replay spoof attack detection by joint segment-based linear filter bank feature extraction and attention-enhanced DenseNet-BiLSTM network
Khan et al. Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures
Liu et al. An MFCC‐based text‐independent speaker identification system for access control
Chen et al. Speaker verification using MFCC and support vector machine
Naika An overview of automatic speaker verification system
Cui et al. Synthetic speech detection based on local autoregression and variance statistics
Neustein et al. Forensic speaker recognition
Mary et al. Analysis and detection of mimicked speech based on prosodic features
Ali et al. Fake audio detection using hierarchical representations learning and spectrogram features
Muhammad et al. Environment recognition from audio using MPEG-7 features
Bhukya et al. Audio deepfakes: feature extraction and model evaluation for detection
Li et al. Cost‐Sensitive Learning for Emotion Robust Speaker Recognition
Ustubioglu et al. KTUCengAudioForgerySet: A new audio copy-move forgery dataset
Chen et al. Forensic identification for electronic disguised voice based on supervector and statistical analysis
Mohammed et al. Analysis of methods and techniques used for speaker identification, recognition, and verification: A study on quarter-century research outcomes
Singh et al. Speaker identification through natural and whisper speech signal
Wu et al. Identification of reconstructed speech
Naing et al. UCSYSpoof: A Myanmar Language Dataset for Voice Spoofing Detection
Chiu et al. CUHK-EE Systems for the vTAD Challenge at NCMMSC 2025
Chao et al. Vocal effort detection based on spectral information entropy feature and model fusion
Nnabueze Ajimah et al. Biometric voice recognition system in the context of multiple languages: using traditional means of identification of individuals in Nigeria languages and English language