Using PCA to Improve the Generation of Speech Keys

  • Juan A. Nolazco-Flores
  • J. Carlos Mex-Perera
  • L. Paola Garcia-Perera
  • Brenda Sanchez-Torres
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4293)


This research shows the improvement obtained by including the principal component analysis as part of the feature production in the generation of a speech key. The main architecture includes an automatic segmentation of speech and a classifier. The first one, by using a forced alignment configuration, computes a set of primary features, obtains a phonetic acoustic model, and finds the beginnings and ends of the phones in each utterance. The primary features are then transformed according to both the phone model parameters and the phones segments per utterance. Before feeding these processed features to the classifier, the principal component analysis algorithm is applied to the data and a new set of secondary features is built. Then a support vector machine classifier generates an hyperplane that is capable to produce a phone key. Finally, by performing a phone spotting technique, the key is hardened. In this research the results for 10, 20 and 30 users are given using the YOHO database. 90% accuracy.


Principal Component Analysis Support Vector Machine Radial Basis Function Speech Signal Support Vector Machine Model 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Campbell Jr., J.P.: Features and Measures for Speaker Recognition. Ph.D. Dissertation, Oklahoma State University (1992)Google Scholar
  2. 2.
    Beringer, N., Schiel, F.: Independent Automatic Segmentation of Speech by Pronunciation Modeling. In: Proc. of the ICPhS 1999, San Francisco, August 1999, pp. 1653–1656 (1999)Google Scholar
  3. 3.
    Binnenpoorte, D., Goddijn, S., Cucchiarini, C.: How to Improve Human and Machine Transcriptions of Spontaneous Speech. In: Proceedings ISCA and IEEE Workshop on Spontaneous Speech Processing and Recognition (SSPR), Tokyo, Japan, April 2003, pp. 147–150 (2003)Google Scholar
  4. 4.
    Cortes, C., Vapnik, V.: Support-vector network. Machine Learning 20, 273–297 (1995)MATHGoogle Scholar
  5. 5.
    Furui, S.: Digital Speech Processing, Synthesis, and Recognition. Marcel Dekker, New York (2001)Google Scholar
  6. 6.
    Huang, X., Acero, A., Hon, H.: Spoken Language Processing: A Guide to Theory, Algorithm and System Development. Prentice-Hall, Upper Saddle River (2001)Google Scholar
  7. 7.
    Higgins, A., Porter, J.J., Bahler, L.: YOHO Speaker Authentication Final Report. ITT Defense Communications Division (1989)Google Scholar
  8. 8.
    Young, S., Woodland, P.: HTK Hidden Markov Model Toolkit home page,
  9. 9.
    Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation From Voice. In: Proceedings of the IEEE Conference on Security and Privacy, Oakland, CA (2001)Google Scholar
  10. 10.
    Osuna, E., Freund R., Girosi F.: Support vector machines: Training and applications. Technical Report AIM-1602, MIT A.I. Lab. (1996)Google Scholar
  11. 11.
    Osuna, E., Freund, R., Girosi, F.: Training Support Vector Machines: An Application to Face Recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 130–136 (1997)Google Scholar
  12. 12.
    Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257–286 (1989)CrossRefGoogle Scholar
  13. 13.
    Rabiner, L.R., Juang, B.-H.: Fundamentals of speech recognition. Prentice-Hall, New-Jersey (1993)Google Scholar
  14. 14.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6) (2004)Google Scholar
  15. 15.
    Joachims, T.: SVMLight: Support Vector Machine, SVM-Light Support Vector Machine, University of Dortmund (1999),
  16. 16.
    Wan, V., Renals, S.: Speaker Verification Using Sequence Discriminant Support Vector Machines. IEEE Transactions on speech and audio processing 13(2) (March 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Juan A. Nolazco-Flores
    • 1
  • J. Carlos Mex-Perera
    • 1
  • L. Paola Garcia-Perera
    • 1
  • Brenda Sanchez-Torres
    • 1
  1. 1.Computer Science DepartmentITESMMéxico

Personalised recommendations