Author :
Tadeusiewicz, Ryszard ; Demenko, Grazyna
Author_Institution :
Dept. of Autom. Control, AGH Univ. of Sci. & Technol., Krakow, Poland
Abstract :
Biometric methods numerous advantages are known very well for every computer security specialist and are in general highly valued. One of the most interesting methods used for biometric protection of computer system (and other objects) is speech parameters extraction, analysis and recognition. Problem under consideration is concentrated on methods showing, how to distinguish between voices of particular people and how to do it independent on the text pronounced by recognized person. Methods used for this purpose are complementary ones in comparison with widely used speech recognition goals, where we must understand the merit content of the utterance disregarding individual features of the voices of different speakers taken into account. The paper shows general problems related to biometric speaker identification and gives general outline, how to use voice as a key for guarded systems.
Keywords :
biometrics (access control); speaker recognition; speech processing; biometric speaker identification; speech analysis; speech parameter extraction; speech recognition; voice parameter; Access control; Biometrics; Humans; Morphology; Mouth; Protection; Signal processing; Speech analysis; Speech processing; Speech recognition; biometric identification; speaker recognition; speech processing; voice parameters;
Conference_Titel :
Biometrics and Kansei Engineering, 2009. ICBAKE 2009. International Conference on
Conference_Location :
Cieszyn
Print_ISBN :
978-0-7695-3692-7
Electronic_ISBN :
978-0-7695-3692-7
DOI :
10.1109/ICBAKE.2009.28