2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON) 2019
DOI: 10.1109/ukrcon.2019.8879937
|View full text |Cite
|
Sign up to set email alerts
|

Speaker’s Voice Recognition Methods in High-Level Interference Conditions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Alternatively, biometric authentication systems (BASs) [2] conduct user recognition based on their physiological and behavioral properties, which are known as biometrics [3], and hence are not trivially lost or forgotten. Voice, for example, is a biometric with great potential for applications in BASs [4], which defines voice-based authentication systems (VASs) [5]. Among the advantages of its use, we can highlight its uniqueness with the user, since each individual has a voice characterized by their unique vocal tract [6]; its ease of collection [7], since the biometrics reading is performed in a completely noninvasive way and without any physical interaction with devices, which also guarantees asepsis; a large quantity of literature [8] and computational packages [9] available for use; and the low cost of devices [10] used for collection, since any electronic system connected to a microphone can be used for this purpose [11].…”
Section: Introductionmentioning
confidence: 99%
“…Alternatively, biometric authentication systems (BASs) [2] conduct user recognition based on their physiological and behavioral properties, which are known as biometrics [3], and hence are not trivially lost or forgotten. Voice, for example, is a biometric with great potential for applications in BASs [4], which defines voice-based authentication systems (VASs) [5]. Among the advantages of its use, we can highlight its uniqueness with the user, since each individual has a voice characterized by their unique vocal tract [6]; its ease of collection [7], since the biometrics reading is performed in a completely noninvasive way and without any physical interaction with devices, which also guarantees asepsis; a large quantity of literature [8] and computational packages [9] available for use; and the low cost of devices [10] used for collection, since any electronic system connected to a microphone can be used for this purpose [11].…”
Section: Introductionmentioning
confidence: 99%
“…Biometrics [1] is defined as a physiological or behavioral attribute that can be used to uniquely characterize an individual. As examples, we can cite fingerprints [2], faces [3], iris [4], ears [5], voice [6], palmprint [7], body silhouette [8], walking way [9], among others. Based on these characteristics, user recognition systems can be defined, being this known as Biometric Authentication Systems (BASs) [10].…”
Section: Introductionmentioning
confidence: 99%
“…Such means of protection conduct dynamic and statistical analysis of files in a virtual environment and block various attacks if necessary [3,4].…”
Section: Introductionmentioning
confidence: 99%