A review on feature extraction for speaker recognition under degraded conditions

G Dişken, Z Tüfekçi, L Saribulut, U Çevik - IETE Technical Review, 2017 - Taylor & Francis
Speech is a signal that includes speaker's emotion, characteristic specification, phoneme-
information etc. Various methods have been proposed for speaker recognition by extracting …

[PDF][PDF] Investigation of sub-band discriminative information between spoofed and genuine speech.

K Sriskandaraja, V Sethu, PN Le, E Ambikairajah - Interspeech, 2016 - researchgate.net
A speaker verification system should include effective precautions against malicious
spoofing attacks, and although some initial countermeasures have been recently proposed …

[PDF][PDF] Investigation on Blind Bandwidth Extension with a Non-Linear Function and its Evaluation of x-Vector-Based Speaker Verification.

R Kaminishi, H Miyamoto, S Shiota, H Kiya - INTERSPEECH, 2019 - isca-archive.org
This study evaluates the effects of some non-learning blind bandwidth extension (BWE)
methods on automatic speaker verification (ASV) systems based on x-vector. Recently, a …

Non-linear harmonic generation based blind bandwidth extension considering aliasing artifacts

H Miyamoto, S Shiota, H Kiya - 2018 Asia-Pacific Signal and …, 2018 - ieeexplore.ieee.org
This paper has three aims that are to point out that signals generated by conventional BWE
methods generally include some aliasing artifacts, to propose a novel bandwidth extension …

Blind bandwidth extension with a non-linear function and its evaluation on automatic speaker verification

R Kaminishi, H Miyamoto, S Shiota… - … on Information and …, 2020 - search.ieice.org
This study evaluates the effects of some non-learning blind bandwidth extension (BWE)
methods on state-of-the-art automatic speaker verification (ASV) systems. Recently, a non …

Spoofing countermeasures for secure and robust voice authentication system: Feature extraction and modelling

K Sriskandaraja - 2018 - unsworks.unsw.edu.au
The ability to employ automatic speaker verification systems without face-to-face contact
makes them more prone to malicious spoofing attacks compared to most other biometric …

[PDF][PDF] ANALYSIS OF DEEP NEUTRAL NETWORKS IN ACOUSTIC MODELING

V Pritish, M Iliyas, B Gupta - publications.anveshanaindia.com
In this work, we propose a modular combination of two popular applications of neural
networks to large-vocabulary continuous speech recognition. First, a deep neural network is …

Investigation on latency issues and objective measurements of non-linear blind bandwidth extension

H Miyamoto, S Shiota, H Kiya - 2019 IEEE 8th Global …, 2019 - ieeexplore.ieee.org
This paper investigates the algorithmic latency of non-learning blind bandwidth extension
(BWE) approaches, and evaluates their quality with objective measurements. BWE methods …

HMM およびEnd-to-End 音声認識における非線形帯域拡張法の性能調査

今泉遼, 塩田さやか, 貴家仁志 - 研究報告音声言語情報処理(SLP), 2019 - ipsj.ixsq.nii.ac.jp
論文抄録 本論文では非線形帯域拡張法を適用した音声が音声認識システムに与える影響
について性能調査する. 音声認識システムと入力されるテストデータにサンプリング周波数の不一致 …

i-vector/PLDA に基づく話者照合による非線形帯域拡張法の評価

上西遼大, 塩田さやか, 貴家仁志 - 研究報告音声言語情報処理 …, 2018 - ipsj.ixsq.nii.ac.jp
論文抄録 本論文は, i-vector/PLDA に基づく話者照合システムを用いて非線形帯域拡張 (N-Bwe)
法を評価することを目的としている. N-Bwe 法とは帯域拡張法の一つで, モデル学習を行わず …