Speaker Identification using Row Mean of Haar and Kekre’s Transform on Spectrograms of Different Frame Sizes
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 9
Abstract
In this paper, we propose Speaker Identification using two transforms, namely Haar Transform and Kekre’s Transform. The speech signal spoken by a particular speaker is converted into a spectrogram by using 25% and 50% overlap between consecutive sample vectors. The two transforms are applied on the spectrogram. The row mean of the transformed matrix forms the feature vector, which is used in the training as well as matching phases. The results of both the transform techniques have been compared. Haar transform gives fairly good results with a maximum accuracy of 69% for both 25% as well as 50% overlap. Kekre’s Transform shows much better performance, with a maximum accuracy of 85.7% for 25% overlap and 88.5% accuracy for 50% overlap.
Authors and Affiliations
Dr. H B Kekre , Vaishali Kulkarni
Detection and Identification System of Bacteria and Bacterial Endotoxin Based on Raman Spectroscopy
Sepsis is a global health problem that causes risk of death. In the developing world, about 60 to 80 % of death cases are caused by Sepsis. Rapid methods for detecting its causes, represent one of the major factors that...
Automation Lecture Scheduling Information Services through the Email Auto-Reply Application
The study program of information systems is one of the largest studies programs at Indonesian Computer University (UNIKOM). In the process of scheduling lectures in the study program of information systems, it has alread...
Network Packet Classification using Neural Network based on Training Function and Hidden Layer Neuron Number Variation
Distributed denial of service (DDoS) is a structured network attack coming from various sources and fused to form a large packet stream. DDoS packet stream pattern behaves as normal packet stream pattern and very difficu...
Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection
Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several attacks, intrusion and security vulnerabilities. Intrusion detection...
HIDING AN IMAGE INSIDE ANOTHER IMAGE USING VARIABLE-RATE STEGANOGRAPHY
A new algorithm is presented for hiding a secret image in the least significant bits of a cover image. The images used may be color or grayscale images. The number of bits used for hiding changes according to pixel neigh...