Speaker Authentication System Design

Chapter
Part of the Signals and Communication Technology book series (SCT)

Abstract

In this book, we have introduced various speaker authentication techniques. Each of the techniques can be considered as a technical component, such as speaker identification, speaker verification, verbal information verification, and so on. In real-world applications, a speaker authentication system can be designed by combining the technical components to construct a useful and convenient system to meet the requirements of a particular application. In this chapter we provide an example of a speaker authentication system design. Following this example, the author hopes readers can design their own system for their particular applications to improve the security level of the protected system. This design example was originally reported in [2].

Keywords

Speaker Recognition Baseline System Acoustic Environment Automatic Enrollment Test Utterance 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Li, Q. and Juang, B.-H., Speaker verification using verbal information verifica- tion for automatic enrollment, in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (Seattle), May 1998Google Scholar
  2. 2.
    Li, Q., Juang, B.-H., Zhou, Q., Lee, C.-H.: Automatic verbal information verification for user authentication. IEEE Trans. on Speech and Audio Processing 8, 585–596 (2000)CrossRefGoogle Scholar
  3. 3.
    Parthasarathy, S. and Rosenberg, A. E., General phrase speaker verification using sub-word background models and likelihood-ratio scoring, in Proceedings of ICSLP-96 (Philadelphia), October 1996Google Scholar
  4. 4.
    Rosenberg, A. E. and Parthasarathy, S., Speaker background models for con- nected digit password speaker verification, in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (Atlanta), pp. 81–84, May 1996Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg  2012

Authors and Affiliations

  1. 1.Li Creative Technologies (LcT), IncFlorham ParkUSA

Personalised recommendations