作者
Hasna Bouraoui, Chadlia Jerad, Anupam Chattopadhyay, Nejib Ben Hadj-Alouane
发表日期
2017/4/28
期刊
ACM Transactions on Embedded Computing Systems (TECS)
卷号
16
期号
3
页码范围
1-28
出版商
ACM
简介
Authentication technologies based on biometrics, such as speaker recognition, are attracting more and more interest thanks to the elevated level of security offered by these technologies. Despite offering many advantages, such as remote use and low vulnerability, speaker recognition applications are constrained by the heavy computational effort and the hard real-time constraints. When such applications are run on an embedded platform, the problem becomes more challenging, as additional constraints inherent to this specific domain are added. In the literature, different hardware architectures were used/designed for implementing a process with a focus on a given particular metric. In this article, we give a survey of the state-of-the-art works on implementations of embedded speaker recognition applications. Our aim is to provide an overview of the different approaches dealing with acceleration techniques …
引用总数
2018201920202021202220232024333121
学术搜索中的文章
H Bouraoui, C Jerad, A Chattopadhyay… - ACM Transactions on Embedded Computing Systems …, 2017