Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/7615
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNaika, Ravika-
dc.date.accessioned2017-07-26T08:24:31Z-
dc.date.available2017-07-26T08:24:31Z-
dc.date.issued2017-05-
dc.identifier.urihttp://hdl.handle.net/123456789/7615-
dc.description.abstractWe live in the digital era, protecting our confidential information is quite a difficult to deal with. Traditional method of securing the data like passwords or token is not enough. In addition to that more devices are connected to the Internet of Things, so the need of ironclad security is paramount. And this is where biometric system can help. Biometric authentication device uses behavioral characteristic of the person like fingerprint, voice, iris etc. So biometric authentication is an excellent way to secure the data. One such form of biometric is speaker verification and it is based on voice biometrics. Automatic speaker verification system checks that the speaker is the person who he or she claims to be. It is the process of verifying the identity on the bases of speech signal or voice print. There are two types of Speaker Verification System : Text-Independent Speaker Verification and Text-Dependent Speaker Verification. The former verify the speaker on the bases of speaker saying exactly enrolled or given words. And the other one verify the identity without the constraint of the speech. Text independent requires bigger training and testing utterances. Speaker verification falls into pattern matching problem. And many technologies used for processing and storing voice prints some of them are frequency estimation, hidden Markov models, Gaussian mixture models, pattern matching algorithms, neural networks, matrix representation, Vector Quantization and decision trees. Speaker verification depends on feature extraction and speaker modeling. There are many modeling techniques for speaker verification but here we have used joint factor analysis(JFA) modeling, UBM-GMM model and inter-session variability(ISV) modeling, i-vector cosine modeling, i-vector-PLDA modeling and artificial neural network with two different data-sets. Here experiments are done with bob spear toolkit with different speaker modeling techniques on voxforge dataset. Automatic speaker verification is vulnerable to different spoofing attacks so here, different spoofing attacks and their countermeasures are discussed. The work is done on replay attack with different feature fusion techniques on ASVspoof2017 dataset.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries15MCEI17;-
dc.subjectComputer 2017en_US
dc.subjectProject Report 2017en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject15MCEIen_US
dc.subject15MCEI17en_US
dc.subjectINSen_US
dc.subjectINS 2017en_US
dc.subjectCE (INS)en_US
dc.titleAutomatic Speaker Verificationen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
15MCEI17.pdf15MCEI171.58 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.