2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) 2015
DOI: 10.1109/isco.2015.7282386
|View full text |Cite
|
Sign up to set email alerts
|

Text-dependent speaker verification system: A review

Abstract: This paper presents an overview of text dependent speaker verification system (SVS). There are several methods of text dependent speaker verification. Here we give brief introduction on text dependent speaker verification and then discuss the structure of several previous works. Available variation of different phases and efficiency of system proposed previously will be discussed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Cloud computing acquired tremendous popularity in recent years, mainly due to advancements in virtualization technology. This technology has shown a new era to many applications that applies speech and signal processing (1,2) with 5g, (3) which provides higher bandwidth and flexibility. To get pay-per-use services, many applications were forwarded to data centers.…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computing acquired tremendous popularity in recent years, mainly due to advancements in virtualization technology. This technology has shown a new era to many applications that applies speech and signal processing (1,2) with 5g, (3) which provides higher bandwidth and flexibility. To get pay-per-use services, many applications were forwarded to data centers.…”
Section: Introductionmentioning
confidence: 99%
“…The latest advances in virtualization technology have elevated it to a significant position currently. Cloud computing has given new life to a wide range of applications, including speech and signal processing [ 1 , 2 ], thanks to the increased bandwidth and flexibility provided by 5G [ 3 ]. A variety of applications are submitted to data centers to obtain pay-per-use services.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, in order to achieve the optimum performance, the input signals must contain as many clean speech segments as possible, while simultaneously discarding low information segments (i.e., silence, noise, noise-corrupted speech). To accomplish this, many speaker recognition systems utilize a speech activity detector (SAD) as the first step in the process to select frames from the presented signal that contain speech [Debnath et al, 2015;Kumar et al, 2017]. Typically the SAD will utilize speech parameters such as signal energy, long-term spectral divergence, or melfrequency cepstrum coefficients (MFCCs) to make a decision whether or not speech is present [Asgari et al, 2008].…”
Section: Introductionmentioning
confidence: 99%