1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258) 1999
DOI: 10.1109/icassp.1999.759798
|View full text |Cite
|
Sign up to set email alerts
|

Background model design for flexible and portable speaker verification systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2002
2002
2011
2011

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…For comparison purposes, the proposed PLR test is compared with the other three algorithms, which are HMM-based and utilize only meaningful patterns. These are the LRT algorithm based on cohort (LRT-cohort) [19], the LRT algorithm based on perturbed background models (LRT-PBM) [20] and THMM algorithm [11].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…For comparison purposes, the proposed PLR test is compared with the other three algorithms, which are HMM-based and utilize only meaningful patterns. These are the LRT algorithm based on cohort (LRT-cohort) [19], the LRT algorithm based on perturbed background models (LRT-PBM) [20] and THMM algorithm [11].…”
Section: Resultsmentioning
confidence: 99%
“…Reynolds et al [15] used patterns from a set of meaningful classes to train a unique background model based on the Gaussian mixture model (GMM) which they called universal background model (UBM). Siohan et al [20] proposed a perturbed training method to train a specific background model for each meaningful class using their own patterns. The background models are also HMMs that are trained with the same training samples used in activity HMMs.…”
Section: Review Of Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In such an SV system, it is desirable to perform SV using only utterances of enrolled speakers. This issue was already addressed in text-dependent SV using hidden Markov model [4] and text-independent SV using GMM [5], [6].…”
Section: Introductionmentioning
confidence: 99%
“…To improve the competitiveness of this model, a previous study [11] proposed the use of a modified normalizing model (MNM) determined by perturbing the inferred background model using the enrollment data to reflect the lexical content of the speaker's password. In another study [12], the authors proposed the use of the speaker enrollment data to (1) train a background model with fewer number of parameters compared to the speaker model or (2) perturbing the temporal information by reversing the state order of the previously trained background model. In the work reported here, we will demonstrate that the use of multiple background models, corresponding to the inferred speakerindependent password HMM models can improve the performance of the UCP-SV system.…”
Section: Speaker Verification 71 Score Normalizationmentioning
confidence: 99%