Speaker Identification using Row Mean of DCT and Walsh Hadamard Transform
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
In this paper we propose a unique approach to text dependent speaker identification using transformation techniques such as DCT (Discrete Cosine Transform) and WHT (Walsh and Hadamard Transform). The feature vectors for identification are extracted using two different techniques using the transforms, one without overlap and the other with overlap. The results show that accuracy increases as the feature vector size is increased from 64 onwards. But for feature vector size of more than 512 the accuracy again starts decreasing. The maximum accuracy without overlap is more than with overlap for both the transforms. Also the results show that DCT performs better than WHT. The maximum accuracy obtained for DCT is 94.28% for a feature vector size of 512.
Authors and Affiliations
Dr. H B Kekre , Vaishali Kulkarni , Sunil Venkatraman , Anshu Priya , Sujatha Narasimhan
An Empirical Study on XML Schema Idiosyncrasies in Big Data Processing
The design and maintenance of the XML schemas for the enterprise, if done incorrectly, can be difficult and frustrating experience. The applications that use XML data binding or participate in the processing of large and...
A SURVEY OF CALL MARKET (DISCRETE) AGENT BASED ARTIFICIAL STOCK MARKETS
Artificial stock markets are models of financial markets used to study and understand market dynamics. Agent Based Artificial Stock Markets can be seen as any market model in which prices are formed endogenously as a res...
MSMET: A MODIFIED & SECURE MULTILANGUAGE ENCRYPTION TECHNIQUE
Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Multilanguage cryptography, an advancement of classical cryptography, may evolve as a choice of clas...
A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
Encryption is the process of transforming plaintext into the ciphertext where plaintext is the input to the encryption process and ciphertext is the output of the encryption process. Decryption is the process of transfor...
Comparison of Digital Water Marking methods
In Digital watermarking, image or video is embedded information data within an insensible form for human visual system but in a way that protects from attacks such as common image processing techniques. Spatial domain(Le...