Speaker authentication system using soft computing approaches
Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-L...
Saved in:
Main Authors: | Abdul Rahman, Abdul Wahab, See Ng, Goek, Dickiyanto, Romy |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2005
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf http://irep.iium.edu.my/38183/ http://www.sciencedirect.com/science/article/pii/S0925231205000421# |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Integrated biometric verification system using soft computing approach
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2007) -
Feature extraction for neural-fuzzy inference system
by: Quek, Chai, et al.
Published: (2003) -
Driving profile modeling and recognition based on soft computing approach
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2009) -
Password authentication using biometric function (voice/speaker recognition) / Mohd Shahman Samsul Ambia
by: Mohd Shahman , Samsul Ambia
Published: (2002) -
Soft computing approach for solving elevator scheduling problem
by: Norzatul Hajar, Abd Majid
Published: (2010)