skip to main content
10.1145/1967486.1967624acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Speaker model updating by the conversational sounds in speaker verification

Published: 08 November 2010 Publication History

Abstract

Recent advancements in information technology have enabled handheld devices to process many types of information. Most security locks used in these devices are managed through the use of a password. However, this feature has attracted only a few users because conventional security is generally viewed as troublesome. Speaker verification is a possible alternative because it offers a feature that converts the user's password into a security lock. Because this is a unobtrusive user certification method, it is less cumbersome for the user. However, speaker verification is not robust to changes in the user's voices. Therefore, in this study, we propose to update the speaker model used for speaker verification in smart-phones. The sound samples comprise Japanese phoneme-balanced sentences recorded from 20 speakers over a 1-month period. The speaker models are updated by putting an old sound sample and a new sound sample together. As a result of the model update, the equal error rate (EER) decreases from 9.84% to 5.46%, representing a drop of approximately 44.52%.

References

[1]
D. Reynolds, "An overview of automatic speaker recognition technology" In Proc. ICASSP-02, 2002.
[2]
T. ASAMI, "Noise-Robust Speaker Verification Using F0 Features' lCSLP 2004, vol. 2, pp. 1417--1420.
[3]
E. Vildjiounaite, "Unobtrusive Multimodal Biometrics for Ensuring Privacy and Information Security with Personal Devices" Pervasive Computing, 2006/05.
[4]
S. Young, "The HTK Book", CUED, 2002.
[5]
H. Kawahara, "Speech representation and transformation using adaptive interpolation of weighted spectrum: vocoder revisited" ICASSP, 1997.
[6]
F. Weber, "Using prosodic and lexical information for speaker identification" Proc. ICASSP2002, 2002-5.
[7]
E. Vildjiounaite, "Increasing Security of Mobile Devices by Decreasing User Effort in Verification" Systems and Networks Communications, 2007.
[8]
I. Yuichi, "Fundamental frequency estimation using periodic and harmonic features in real environments" IEICE, 2004-01-01
[9]
M. Tomoko, "Speaker Model and Decision Threshold Updating in Speaker Verification" EurAsia-ICT 2002.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
iiWAS '10: Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
November 2010
895 pages
ISBN:9781450304214
DOI:10.1145/1967486
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • IIWAS: International Organization for Information Integration
  • Web-b: Web-b

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Gaussian mixture model
  2. biometrie security
  3. mobile security
  4. speaker verification system
  5. speech processing

Qualifiers

  • Research-article

Conference

iiWAS '10
Sponsor:
  • IIWAS
  • Web-b

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 57
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media