Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/93911
Title: Voxsecure : voice-based biometric speaker verification
Authors: Demarco, Andrea (2008)
Keywords: Pattern recognition systems
Automatic speech recognition
Computer input-output equipment
Issue Date: 2008
Citation: Demarco, A. (2008). Voxsecure : voice-based biometric speaker verification (Bachelor's dissertation).
Abstract: The acoustic features of speech have been found to differ between individuals. These acoustic patterns reflect both anatomy and learned behavioral patterns. This incorporation of learned patterns into the voice models has earned speaker verification its classification as a "behavioral biometric." The aim of this project is to design and implement a code toolkit that enables voiceprint scanning and analysis of different speakers. The toolkit will be tested on different speaker models from different recording sources, and will enable voice learning, voice identification and voice verification. Once the toolkit is in place the second objective is to build a reference implementation demo software, that utilizes the functionality of the VoxSecure toolkit for experimentation and evaluation. The task can be described as a classification problem, with two subtasks: (i) feature extraction and (ii) feature modeling and pattern matching. Feature extraction is done using one of the most successful methods in literature, Mel-Frequency Ceptrum Coefficients, which is obtained by a pipeline of digital signal processing techniques. The feature modeling is done by building a Gaussian Mixture Model (GMM), which is a probability density function to represent a speaker's voice model. The GMM parameters are first estimated using clustering algorithms such as K-Means, and then optimized using the Expectation-Maximization (EM) algorithm. Identification/Verification can then be performed using statistical inference on the GMM. With rigorous evaluation, we managed to configure VoxSecure for a 1003 identification rate on our corpus, and as an obvious parallel, an excellent verification system. These results augur well for the future application of similar systems in security scenarios outside of laboratory conditions. We are not yet capable, though, of utilizing such a system for real security scenarios, due to lack of training data, and due to the errors on short testing samples.
Description: B.Sc. IT (Hons)(Melit.)
URI: https://www.um.edu.mt/library/oar/handle/123456789/93911
Appears in Collections:Dissertations - FacICT - 1999-2009
Dissertations - FacICTCS - 2008

Files in This Item:
File Description SizeFormat 
B.SC.(HONS)IT_Demarco_Andrea_2008.PDF
  Restricted Access
13.98 MBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.