Speaker authentication system using soft computing approaches

Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-L...

Full description

Bibliographic Details
Main Authors: Abdul Rahman, Abdul Wahab, See Ng, Goek, Dickiyanto, Romy
Format: Article
Language:English
Published: Elsevier 2005
Subjects:
Online Access:http://irep.iium.edu.my/38183/
http://irep.iium.edu.my/38183/
http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf
id iium-38183
recordtype eprints
spelling iium-381832014-09-12T02:18:01Z http://irep.iium.edu.my/38183/ Speaker authentication system using soft computing approaches Abdul Rahman, Abdul Wahab See Ng, Goek Dickiyanto, Romy T Technology (General) Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources. Elsevier 2005-03-31 Article PeerReviewed application/pdf en http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf Abdul Rahman, Abdul Wahab and See Ng, Goek and Dickiyanto, Romy (2005) Speaker authentication system using soft computing approaches. Neurocomputing, 68. pp. 13-37. ISSN 0925-2312 http://www.sciencedirect.com/science/article/pii/S0925231205000421#
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic T Technology (General)
spellingShingle T Technology (General)
Abdul Rahman, Abdul Wahab
See Ng, Goek
Dickiyanto, Romy
Speaker authentication system using soft computing approaches
description Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources.
format Article
author Abdul Rahman, Abdul Wahab
See Ng, Goek
Dickiyanto, Romy
author_facet Abdul Rahman, Abdul Wahab
See Ng, Goek
Dickiyanto, Romy
author_sort Abdul Rahman, Abdul Wahab
title Speaker authentication system using soft computing approaches
title_short Speaker authentication system using soft computing approaches
title_full Speaker authentication system using soft computing approaches
title_fullStr Speaker authentication system using soft computing approaches
title_full_unstemmed Speaker authentication system using soft computing approaches
title_sort speaker authentication system using soft computing approaches
publisher Elsevier
publishDate 2005
url http://irep.iium.edu.my/38183/
http://irep.iium.edu.my/38183/
http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf
first_indexed 2023-09-18T20:54:49Z
last_indexed 2023-09-18T20:54:49Z
_version_ 1777410233811861504