Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/7615
Title: Automatic Speaker Verification
Authors: Naika, Ravika
Keywords: Computer 2017
Project Report 2017
Computer Project Report
Project Report
15MCEI
15MCEI17
INS
INS 2017
CE (INS)
Issue Date: May-2017
Publisher: Institute of Technology
Series/Report no.: 15MCEI17;
Abstract: We live in the digital era, protecting our confidential information is quite a difficult to deal with. Traditional method of securing the data like passwords or token is not enough. In addition to that more devices are connected to the Internet of Things, so the need of ironclad security is paramount. And this is where biometric system can help. Biometric authentication device uses behavioral characteristic of the person like fingerprint, voice, iris etc. So biometric authentication is an excellent way to secure the data. One such form of biometric is speaker verification and it is based on voice biometrics. Automatic speaker verification system checks that the speaker is the person who he or she claims to be. It is the process of verifying the identity on the bases of speech signal or voice print. There are two types of Speaker Verification System : Text-Independent Speaker Verification and Text-Dependent Speaker Verification. The former verify the speaker on the bases of speaker saying exactly enrolled or given words. And the other one verify the identity without the constraint of the speech. Text independent requires bigger training and testing utterances. Speaker verification falls into pattern matching problem. And many technologies used for processing and storing voice prints some of them are frequency estimation, hidden Markov models, Gaussian mixture models, pattern matching algorithms, neural networks, matrix representation, Vector Quantization and decision trees. Speaker verification depends on feature extraction and speaker modeling. There are many modeling techniques for speaker verification but here we have used joint factor analysis(JFA) modeling, UBM-GMM model and inter-session variability(ISV) modeling, i-vector cosine modeling, i-vector-PLDA modeling and artificial neural network with two different data-sets. Here experiments are done with bob spear toolkit with different speaker modeling techniques on voxforge dataset. Automatic speaker verification is vulnerable to different spoofing attacks so here, different spoofing attacks and their countermeasures are discussed. The work is done on replay attack with different feature fusion techniques on ASVspoof2017 dataset.
URI: http://hdl.handle.net/123456789/7615
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
15MCEI17.pdf15MCEI171.58 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.