[图书][B] Speech processing in mobile environments
KS Rao, AK Vuppala - 2014 - Springer
Robust speech systems in mobile environment have gained a special interest in recent
years in order to enable access to remote voice-activated services. In this context, three …
years in order to enable access to remote voice-activated services. In this context, three …
Steganalysis of transcoding steganography
Transcoding steganography (TranSteg) is a fairly new IP telephony steganographic method
that functions by compressing overt (voice) data to make space for the steganogram by …
that functions by compressing overt (voice) data to make space for the steganogram by …
[PDF][PDF] Non-linguistic vocalisation recognition based on hybrid GMM-SVM approach.
A Janicki - INTERSPEECH, 2013 - isca-archive.org
This paper describes an algorithm for detection of nonlinguistic vocalisations, such as
laughter or fillers, based on acoustic features. The algorithm proposed combines the …
laughter or fillers, based on acoustic features. The algorithm proposed combines the …
Recognition of extraversion level based on handwriting and support vector machines
Z Górska, A Janicki - Perceptual and motor skills, 2012 - journals.sagepub.com
This study investigated whether it is possible to train a machine to discriminate levels of
extraversion based on handwriting variables. Support vector machines (SVMs) were used …
extraversion based on handwriting variables. Support vector machines (SVMs) were used …
On the impact of non-speech sounds on speaker recognition
A Janicki - Text, Speech and Dialogue: 15th International …, 2012 - Springer
This paper investigates the impact of non-speech sounds on the performance of speaker
recognition. Various experiments were conducted to check what the accuracy of speaker …
recognition. Various experiments were conducted to check what the accuracy of speaker …
Increasing anti-spoofing protection in speaker verification using linear prediction
A Janicki - Multimedia Tools and Applications, 2017 - Springer
This article addresses the problem of anti-spoofing protection in an automatic speaker
verification (ASV) system. An improved version of a previously proposed spoofing …
verification (ASV) system. An improved version of a previously proposed spoofing …
Influence of speech codecs selection on transcoding steganography
The typical approach to steganography is to compress the covert data in order to limit its
size, which is reasonable in the context of a limited steganographic bandwidth. Trancoding …
size, which is reasonable in the context of a limited steganographic bandwidth. Trancoding …
Assessment of automatic Speaker verification on lossy transcoded speech
J Polacky, R Jarina, M Chmulik - 2016 4th International …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the effect of lossy speech compression on text-independent
speaker verification task. We have evaluated the voice biometrics performance over several …
speaker verification task. We have evaluated the voice biometrics performance over several …
[PDF][PDF] Spectral Sub-band Analysis of Speaker Verification Employing Narrowband and Wideband Speech.
It is well known that the speaker discriminative information is not equally distributed over the
spectral domain. However, it is still not clear whether that distribution is altered when the …
spectral domain. However, it is still not clear whether that distribution is altered when the …
Thermal Biometric Features for Drunk Person Identification Using Multi-Frame Imagery
G Koukiou - Electronics, 2022 - mdpi.com
In this work, multi-frame thermal imagery of the face of a person is employed for drunk
identification. Regions with almost constant temperature on the face of sober and drunk …
identification. Regions with almost constant temperature on the face of sober and drunk …