Speaker authentication system using soft computing approaches

Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-L...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdul Rahman, Abdul Wahab, See Ng, Goek, Dickiyanto, Romy
Format: Article
Language:English
Published: Elsevier 2005
Subjects:
Online Access:http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf
http://irep.iium.edu.my/38183/
http://www.sciencedirect.com/science/article/pii/S0925231205000421#
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.38183
record_format dspace
spelling my.iium.irep.381832014-09-12T02:18:01Z http://irep.iium.edu.my/38183/ Speaker authentication system using soft computing approaches Abdul Rahman, Abdul Wahab See Ng, Goek Dickiyanto, Romy T Technology (General) Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources. Elsevier 2005-03-31 Article REM application/pdf en http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf Abdul Rahman, Abdul Wahab and See Ng, Goek and Dickiyanto, Romy (2005) Speaker authentication system using soft computing approaches. Neurocomputing, 68. pp. 13-37. ISSN 0925-2312 http://www.sciencedirect.com/science/article/pii/S0925231205000421#
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic T Technology (General)
spellingShingle T Technology (General)
Abdul Rahman, Abdul Wahab
See Ng, Goek
Dickiyanto, Romy
Speaker authentication system using soft computing approaches
description Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources.
format Article
author Abdul Rahman, Abdul Wahab
See Ng, Goek
Dickiyanto, Romy
author_facet Abdul Rahman, Abdul Wahab
See Ng, Goek
Dickiyanto, Romy
author_sort Abdul Rahman, Abdul Wahab
title Speaker authentication system using soft computing approaches
title_short Speaker authentication system using soft computing approaches
title_full Speaker authentication system using soft computing approaches
title_fullStr Speaker authentication system using soft computing approaches
title_full_unstemmed Speaker authentication system using soft computing approaches
title_sort speaker authentication system using soft computing approaches
publisher Elsevier
publishDate 2005
url http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf
http://irep.iium.edu.my/38183/
http://www.sciencedirect.com/science/article/pii/S0925231205000421#
_version_ 1643611366461800448
score 13.160551