Person Authentication by voice and image using ANFIS and Shifted MFCC
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
In security systems, the interest in using biometric technologies for person authentication has grown rapidly. Voice is one of the most promising and mature biometric modalities for secured access control. Here presents a novel approach to recognize/identify speakers with their images by including a new set of features and using Gaussian mixture models (GMMs). In this research, the concept of shifted MFCC is introduced so as to incorporate accent information in the recognition algorithm. VQ method is used for feature matching due to the ease of implementation and high accuracy. The goal of this project is to build a simple, yet complete and representative automatic speaker recognition system. Due to the limited space, we will only test our system on a very small speech database. The image of the speaker will also be displayed for further clarification. We can also hear the spelled word of each speaker in background while running the program. The algorithm showed improvements over the performance of the previous works.
Authors and Affiliations
Bhavyadas, Murugantham C, H S DivakaraMurthy, Parameshachari B D
A Review On Blood Pressure Measuring Devices For Humans
There has been a rising trend in blood pressure patients in the world, due to variety of diseases and stress related issues. Apart, from that the technologies used today are very outdated and cumbersome, while the new...
Design of Energy Efficient Logic Using Adiabatic Technique
With the adiabatic switching approach, the circuit energies are conserved rather than dissipated as heat. Depending on the application and the system requirements, this approach can be used to reduce the power dissip...
Hadoop Map Reduce Job Scheduler Implementation and Analysis in Heterogeneous Environment
Hadoop MapReduce is one of the popular framework for BigData analytics. MapReduce cluster is shared among multiple users with heterogeneous workloads. When jobs are concurrently submitted to the cluster, resources ar...
A Survey of Signcryption Its Type and Techniques
Signcryption is a combinational method of performing signatures of the encrypted data so that the data can be made secure and authenticated during the access of the data. Since there are various techniques are implem...
Image Compression Technique Using Different Wavelet Function
With the development of Digital image processing technology there are several applications. One of the applications is an image compression. The paper assigned a comparative study has been done using different wavele...