Chen et al., 2016 - Google Patents
Forensic identification for electronic disguised voice based on supervector and statistical analysisChen et al., 2016
- Document ID
- 1912407232728242777
- Author
- Chen Q
- Li J
- Li Y
- Publication year
- Publication venue
- 2016 Conference of The Oriental Chapter of International Committee for Coordination and Standardization of Speech Databases and Assessment Techniques (O-COCOSDA)
External Links
Snippet
This paper proposed a novel algorithm for forensic identification of electronic disguised voice based on supervector and statistical analysis. The supervector was stacked by mixtures of mean vector of Gaussian mixture model. SVM classifier was used to identify …
- 238000007619 statistical method 0 title abstract description 4
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/06—Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
- G10L15/065—Adaptation
- G10L15/07—Adaptation to the speaker
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/04—Training, enrolment or model building
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/08—Use of distortion metrics or a particular distance between probe pattern and reference templates
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sahidullah et al. | Introduction to voice presentation attack detection and recent advances | |
| Chen et al. | ResNet and Model Fusion for Automatic Spoofing Detection. | |
| Hanifa et al. | A review on speaker recognition: Technology and challenges | |
| Tan et al. | A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction | |
| Huang et al. | Audio replay spoof attack detection by joint segment-based linear filter bank feature extraction and attention-enhanced DenseNet-BiLSTM network | |
| Khan et al. | Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures | |
| Liu et al. | An MFCC‐based text‐independent speaker identification system for access control | |
| Chen et al. | Speaker verification using MFCC and support vector machine | |
| Naika | An overview of automatic speaker verification system | |
| Cui et al. | Synthetic speech detection based on local autoregression and variance statistics | |
| Neustein et al. | Forensic speaker recognition | |
| Mary et al. | Analysis and detection of mimicked speech based on prosodic features | |
| Ali et al. | Fake audio detection using hierarchical representations learning and spectrogram features | |
| Muhammad et al. | Environment recognition from audio using MPEG-7 features | |
| Bhukya et al. | Audio deepfakes: feature extraction and model evaluation for detection | |
| Li et al. | Cost‐Sensitive Learning for Emotion Robust Speaker Recognition | |
| Ustubioglu et al. | KTUCengAudioForgerySet: A new audio copy-move forgery dataset | |
| Chen et al. | Forensic identification for electronic disguised voice based on supervector and statistical analysis | |
| Mohammed et al. | Analysis of methods and techniques used for speaker identification, recognition, and verification: A study on quarter-century research outcomes | |
| Singh et al. | Speaker identification through natural and whisper speech signal | |
| Wu et al. | Identification of reconstructed speech | |
| Naing et al. | UCSYSpoof: A Myanmar Language Dataset for Voice Spoofing Detection | |
| Chiu et al. | CUHK-EE Systems for the vTAD Challenge at NCMMSC 2025 | |
| Chao et al. | Vocal effort detection based on spectral information entropy feature and model fusion | |
| Nnabueze Ajimah et al. | Biometric voice recognition system in the context of multiple languages: using traditional means of identification of individuals in Nigeria languages and English language |