An Overview on Speaker Identification Technologies
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 6
Abstract
This paper aims at providing a brief overview into the area of speaker recognition. Speaker recognition can be classified into text dependent and the text independent methods. This paper gives an overview of major techniques developed in each stage of speaker recognition. This paper has a list of techniques along with their results, merits and demerits. After years of research and development the accuracy of speaker recognition remains one of the important research challenges (e.g., variations of the context, speakers, and environment).The design of Speaker Recognition system requires careful attentions to the following issues: feature extraction techniques, database and performance evaluation. The objective of this review paper is to summarize and compare some of the well known methods used in various stages of speaker recognition system and identify research topic and applications which are at the forefront of this exciting and challenging field.
Authors and Affiliations
Shweta Bansal, Alok Kushwaha, S. S Agrawal
Design and Analysis of 12T MTCMOS and Memristor MCAM using VLSI
Memories Are An Integral Part Of Most of the digital devices and hence reducing power consumption of memories as well as area reduction is very important as of today to improve system performance, efficiency and reliabi...
FEA analysis of notched adherent joint between metal and composite object using ANSYS CZM technique
Traditionally in engineering, structural joining has been synonymous to riveting, bolting and other purely mechanical fastening together with welding or soldering in the case of metallic construction materials. Up until...
Spontaneous Wireless ADHOC Network Creation, To Enhance Authentication Based On Self Configure Secure Protocol
The proposal paper presents a self configured secure protocol for spontaneous wireless Adhoc networks which uses hybrid symmetric/ asymmetric scheme for encryption of the data. My proposal is to create a Spontaneous net...
A Survey on Face Recognition Process
Face recognition from under uncontrolled environment is still a big unsolved problem. Robust Face Recognition is needed today, because it has main role bio security. Recognition is done in two ways, with user cooperatio...
Consistency Preservation in Data Cloud By Adopting Efficient Third Party Audit Election for Cloud Storage
Cloud Server consists of many shared resources like platform, software, and infrastructure. In cloud consistency influences the availability and performance of the system. To check the consistency, auditing is done wher...