Automatic speaker verification systems and spoof detection techniques: review and analysis
A Mittal, M Dua - International Journal of Speech Technology, 2022 - Springer
Automatic speaker verification (ASV) systems are enhanced enough, that industry is
attracted to use them practically in security systems. However, vulnerability of these systems …
attracted to use them practically in security systems. However, vulnerability of these systems …
Classifying accelerometer data via hidden markov models to authenticate people by the way they walk
C Nickel, C Busch - IEEE Aerospace and Electronic Systems …, 2013 - ieeexplore.ieee.org
As owners of mobile devices tend to deactivate their security settings, data on these devices
is often insufficiently protected [1]. One reason for this is that most mobile devices do only …
is often insufficiently protected [1]. One reason for this is that most mobile devices do only …
Voice authentication embedded solution for secured access control
The paper presents the concept of the embedded solution for voice biometric access system.
The most important requirements for access control systems are presented, as well as the …
The most important requirements for access control systems are presented, as well as the …
Real-time speaker verification system implemented on reconfigurable hardware
R Ramos-Lara, M López-García… - Journal of Signal …, 2013 - Springer
Nowadays, biometrics is considered as a promising solution in the market of security and
personal verification. Applications such as financial transactions, law enforcement or …
personal verification. Applications such as financial transactions, law enforcement or …
Benchmarking the performance of SVMs and HMMs for accelerometer-based biometric gait recognition
C Nickel, H Brandt, C Busch - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
Support Vector Machines (SVMs) and Hidden Markov Models (HMMs) have been in use for
numerous classification tasks in pattern recognition. HMMs can be considered as a de-facto …
numerous classification tasks in pattern recognition. HMMs can be considered as a de-facto …
[PDF][PDF] Accelerometer-based biometric gait recognition for authentication on smartphones
C Nickel - 2012 - tuprints.ulb.tu-darmstadt.de
The authentication via accelerometer-based biometric gait recognition offers a user-friendly
alternative to common authentication methods on smartphones. It has the great advantage …
alternative to common authentication methods on smartphones. It has the great advantage …
[PDF][PDF] Speaker verification using Gaussian posteriorgrams on fixed phrase short utterances.
This work explores the speaker verification using fixed phrase short utterances. A novel
speaker verification system using Gaussian posteriorgrams is proposed in which the …
speaker verification system using Gaussian posteriorgrams is proposed in which the …
GMM-UBM modeling for speaker recognition on a Romanian large speech corpora
AL Georgescu, H Cucu - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
In recent years, non-intrusive biometric identification systems have evolved very quickly.
Their main advantage over classical systems, based on usernames and passwords, is the …
Their main advantage over classical systems, based on usernames and passwords, is the …
A speaker recognition algorithm based on factor analysis
X Shen, Y Zhai, Y Wang, H Chen - 2014 7th International …, 2014 - ieeexplore.ieee.org
Channel interference factor for the identification result is prevalent among the existing
speaker recognition algorithms. In order to improve the accuracy of the algorithm, the paper …
speaker recognition algorithms. In order to improve the accuracy of the algorithm, the paper …
Flexible biometric online speaker-verification system implemented on FPGA using vector floating-point units
E Canto-Navarro, M Lopez-Garcia… - … Transactions on Very …, 2014 - ieeexplore.ieee.org
This paper presents the implementation of a speaker-verification system on field
programmable gate array. The algorithm is executed by software over an embedded system …
programmable gate array. The algorithm is executed by software over an embedded system …