2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA) 2017
DOI: 10.1109/iceca.2017.8212779
|View full text |Cite
|
Sign up to set email alerts
|

Text dependent voice recognition system using MFCC and VQ for security applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…P. Korshunov et al [2] considered the fact that most biometric technology systems are vulnerable to spoofing which reduces their wide use sometimes hence they presented the need to develop anti-spoofing detection methods also referred to as presentation attack detection (PAD) systems. Arun Kumar Chaudhary et al [3] proposed their method which is an MFCC-centered speaker verification in a noisy atmosphere using VQ. The research evaluation was conducted on the speech signal in a daily noisy environment.…”
Section: Literature Workmentioning
confidence: 99%
“…P. Korshunov et al [2] considered the fact that most biometric technology systems are vulnerable to spoofing which reduces their wide use sometimes hence they presented the need to develop anti-spoofing detection methods also referred to as presentation attack detection (PAD) systems. Arun Kumar Chaudhary et al [3] proposed their method which is an MFCC-centered speaker verification in a noisy atmosphere using VQ. The research evaluation was conducted on the speech signal in a daily noisy environment.…”
Section: Literature Workmentioning
confidence: 99%
“…where 𝑌 𝑡 is the target vector that constructs the adaptation criterion of the operator 𝐻 𝑎 to 𝑅 ̂𝑠𝑑 . The target vector 𝑌 𝑡 is calculated as (6):…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…In order to identify the speaker's voice several methods are used to extract the special features of each voice, among them mel-frequency cepstral coefficients. Although numerous researchers chose it as their feature extraction method because of its several advantages [5], [6], it reaches its limit in the improvement of automatic speaker recognition system as described by references [7]- [9]. It needs a large voice training dataset and a long execution time to identify the voice of each speaker [10] and the same goes for other approaches such as principal component analysis (PCA), discrete wavelet transform (DWT) and empirical modal decomposition (EMD) as revealed by reference [11].…”
Section: Introductionmentioning
confidence: 99%
“…Based on log-likelihood logic decision, the identity of that speaker is accepted if the match is above a threshold. Once the verification result is accepted, the attendance in database for that speaker will be updated [13]…”
Section: Voice Recognitionmentioning
confidence: 99%