Speaker Authentication System Design
In this book, we have introduced various speaker authentication techniques. Each of the techniques can be considered as a technical component, such as speaker identification, speaker verification, verbal information verification, and so on. In real-world applications, a speaker authentication system can be designed by combining the technical components to construct a useful and convenient system to meet the requirements of a particular application. In this chapter we provide an example of a speaker authentication system design. Following this example, the author hopes readers can design their own system for their particular applications to improve the security level of the protected system. This design example was originally reported in .
KeywordsSpeaker Recognition Baseline System Acoustic Environment Automatic Enrollment Test Utterance
Unable to display preview. Download preview PDF.
- 1.Li, Q. and Juang, B.-H., Speaker verification using verbal information verifica- tion for automatic enrollment, in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (Seattle), May 1998Google Scholar
- 3.Parthasarathy, S. and Rosenberg, A. E., General phrase speaker verification using sub-word background models and likelihood-ratio scoring, in Proceedings of ICSLP-96 (Philadelphia), October 1996Google Scholar
- 4.Rosenberg, A. E. and Parthasarathy, S., Speaker background models for con- nected digit password speaker verification, in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (Atlanta), pp. 81–84, May 1996Google Scholar