IIUM Repository

Speaker authentication system using soft computing approaches

Abdul Rahman, Abdul Wahab and See Ng, Goek and Dickiyanto, Romy (2005) Speaker authentication system using soft computing approaches. Neurocomputing, 68. pp. 13-37. ISSN 0925-2312

[img] PDF - Published Version
Restricted to Registered users only

Download (481kB) | Request a copy

Abstract

Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources.

Item Type: Article (Journal)
Additional Information: 6145/38183
Uncontrolled Keywords: Fuzzy neural networks; Speaker authentication system; Pattern matching
Subjects: T Technology > T Technology (General)
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Prof Abdul Wahab Abdul Rahman
Date Deposited: 11 Sep 2014 11:52
Last Modified: 12 Sep 2014 10:18
URI: http://irep.iium.edu.my/id/eprint/38183

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year