BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.

Slides:



Advertisements
Similar presentations
Masters Presentation at Griffith University Master of Computer and Information Engineering Magnus Nilsson
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Speaker Recognition Sharat.S.Chikkerur Center for Unified Biometrics and Sensors
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
A PRESENTATION BY SHAMALEE DESHPANDE
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Speaker Recognition By Afshan Hina.
Supervisor: Dr. Eddie Jones Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification System for Security.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
International Conference on Intelligent and Advanced Systems 2007 Chee-Ming Ting Sh-Hussain Salleh Tian-Swee Tan A. K. Ariff. Jain-De,Lee.
Juan Ortega 10/20/09 NTS490. Speaker recognition is the computing task of validating a user’s claimed identity using characteristics extracted from their.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Voice Recognition All Talk No Walk.
Supervisor: Dr. Eddie Jones Co-supervisor: Dr Martin Glavin Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Speaker Recognition by Habib ur Rehman Abdul Basit CENTER FOR ADVANCED STUDIES IN ENGINERING Digital Signal Processing ( Term Project )
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Speech Recognition Feature Extraction. Speech recognition simplified block diagram Speech Capture Speech Capture Feature Extraction Feature Extraction.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Chapter 7 Speech Recognition Framework  7.1 The main form and application of speech recognition  7.2 The main factors of speech recognition  7.3 The.
Speaker Verification System Middle Term Presentation Performed by: Barak Benita & Daniel Adler Instructor: Erez Sabag.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Speaker Recognition UNIT -6. Introduction  Speaker recognition is the process of automatically recognizing who is speaking on the basis of information.
Multimodal Biometric Security 1.
Study on Deep Learning in Speaker Recognition Lantian Li CSLT / RIIT Tsinghua University May 26, 2016.
Biometrics Security in Banking Systems Image processing in ATM
Access control techniques
ARTIFICIAL NEURAL NETWORKS
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Presentation on Artificial Neural Network Based Pathological Voice Classification Using MFCC Features Presenter: Subash Chandra Pakhrin 072MSI616 MSC in.
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Sharat.S.Chikkerur S.Anand Mantravadi Rajeev.K.Srinivasan
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Sfax University, Tunisia
Neuro-Fuzzy and Soft Computing for Speaker Recognition (語者辨識)
A SEMINAR REPORT ON BIOMETRICS
Ala’a Spaih Abeer Abu-Hantash Directed by Dr.Allam Mousa
Faculty of Science IT Department Lecturer: Raz Dara MA.
Hybrid Finger print recognition
AUDIO SURVEILLANCE SYSTEMS: SUSPICIOUS SOUND RECOGNITION
A maximum likelihood estimation and training on the fly approach
Advances in Deep Audio and Audio-Visual Processing
Presentation transcript:

BIOMETRICS VOICE RECOGNITION

Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared to a template, used in cases to identify specific people by certain characteristics. Biometrics are used to identify the input sample when compared to a template, used in cases to identify specific people by certain characteristics. Possession based Possession based Knowledge based Knowledge based

Characteristics BIOMETRICS PHSYIOLOGICALBEHAVIORAL

Physiological are related to the shape of the body. The oldest traits, that have been used for more than 100 years, are fingerprints. Other examples are face recognition, hand geometry and iris recognition. Physiological are related to the shape of the body. The oldest traits, that have been used for more than 100 years, are fingerprints. Other examples are face recognition, hand geometry and iris recognition.fingerprintsface recognitionhand geometryiris recognitionfingerprintsface recognitionhand geometryiris recognition

Behavioral are related to the behavior of a person. The first characteristic to be used, still widely used today, is the signature. More modern approaches are the study of keystroke dynamics and of voice Behavioral are related to the behavior of a person. The first characteristic to be used, still widely used today, is the signature. More modern approaches are the study of keystroke dynamics and of voicesignaturekeystroke dynamicsvoicesignaturekeystroke dynamicsvoice Strictly speaking, voice is also a physiological trait because every person has a different pitch, but voice recognition is mainly based on the study of the way a person speaks, commonly classified as behavioral. Strictly speaking, voice is also a physiological trait because every person has a different pitch, but voice recognition is mainly based on the study of the way a person speaks, commonly classified as behavioral.pitch

Introduction Speaker recognition has a history dating back some four decades and uses the acoustic features of speech that have been found to differ between individuals. Speaker recognition has a history dating back some four decades and uses the acoustic features of speech that have been found to differ between individuals.

There is a difference between speaker recognition (recognizing who is speaking) and speech recognition (recognizing what is being said). These two terms are frequently confused, as is voice recognition. There is a difference between speaker recognition (recognizing who is speaking) and speech recognition (recognizing what is being said). These two terms are frequently confused, as is voice recognition. speech recognition speech recognition Voice recognition is a synonym for speaker, and thus not speech, recognition. In addition, there is a difference between the act of authentication (commonly referred to as speaker verification or speaker authentication) and identification. Voice recognition is a synonym for speaker, and thus not speech, recognition. In addition, there is a difference between the act of authentication (commonly referred to as speaker verification or speaker authentication) and identification.

If the speaker claims to be of a certain identity and the voice is used to verify this claim this is called verification or authentication. On the other hand, identification is the task of determining an unknown speaker's identity. If the speaker claims to be of a certain identity and the voice is used to verify this claim this is called verification or authentication. On the other hand, identification is the task of determining an unknown speaker's identity. In a sense speaker verification is a 1:1 match where one speaker's voice is matched to one template (also called a "voice print") whereas speaker identification is a 1:N match where the voice is compared against N templates. In a sense speaker verification is a 1:1 match where one speaker's voice is matched to one template (also called a "voice print") whereas speaker identification is a 1:N match where the voice is compared against N templates.

Variants of speaker recognition Each speaker recognition system has two phases: Enrollment and verification. Each speaker recognition system has two phases: Enrollment and verification. ENROLLMENT ENROLLMENT During enrollment, the speaker's voice is recorded and typically a number of features are extracted to form a voice print, template, or model. During enrollment, the speaker's voice is recorded and typically a number of features are extracted to form a voice print, template, or model.

Speech Samples are waveforms Speech Samples are waveforms Time on horizontal axis and Loudness on vertical axis Time on horizontal axis and Loudness on vertical axis Speaker recognition system analyses frequency content Speaker recognition system analyses frequency content Compares characteristics such as the quality, duration intensity dynamic and pitch of the signal Compares characteristics such as the quality, duration intensity dynamic and pitch of the signal

. In the verification phase, a speech sample or "utterance" is compared against a previously created voice print.. In the verification phase, a speech sample or "utterance" is compared against a previously created voice print.

Front-end processing - the "signal processing" part, which converts the sampled speech signal into set of feature vectors, which characterize the properties of speech that can separate different speakers. Front-end processing is performed both in training- and recognition phases. Front-end processing - the "signal processing" part, which converts the sampled speech signal into set of feature vectors, which characterize the properties of speech that can separate different speakers. Front-end processing is performed both in training- and recognition phases. Speaker modeling - this part performs a reduction of feature data by modeling the distributions of the feature vectors. Speaker modeling - this part performs a reduction of feature data by modeling the distributions of the feature vectors.

Speaker database - the speaker models are stored here. Speaker database - the speaker models are stored here. Decision logic - makes the final decision about the identity of the speaker by comparing unknown feature vectors to all models in the database and selecting the best matching model. Decision logic - makes the final decision about the identity of the speaker by comparing unknown feature vectors to all models in the database and selecting the best matching model.

Speaker recognition systems fall into two categories: text-dependent and text- independent. Speaker recognition systems fall into two categories: text-dependent and text- independent. If the text is same for enrollment and verification this is called text-dependent recognition If the text is same for enrollment and verification this is called text-dependent recognition In a text-dependent system, prompts can either be common across all speakers (e.g.: a common pass phrase) or unique In a text-dependent system, prompts can either be common across all speakers (e.g.: a common pass phrase) or unique In addition, the use of shared-secrets (e.g.: passwords and PINs) or knowledge-based information) can be employed in order to create a multi-factor authentication scenario. In addition, the use of shared-secrets (e.g.: passwords and PINs) or knowledge-based information) can be employed in order to create a multi-factor authentication scenario.

Text-independent systems are most often used for speaker identification as they require very little if any cooperation by the speaker. Text-independent systems are most often used for speaker identification as they require very little if any cooperation by the speaker. In this case the text during enrollment and test is different. In fact, the enrollment may happen without the user's knowledge, as in the case for many forensic applications. In this case the text during enrollment and test is different. In fact, the enrollment may happen without the user's knowledge, as in the case for many forensic applications. As text-independent technologies do not compare what was said at enrollment and verification, verification applications tend to also employ speech recognition to determine what the user is saying at the point of authentication. As text-independent technologies do not compare what was said at enrollment and verification, verification applications tend to also employ speech recognition to determine what the user is saying at the point of authentication.speech recognitionspeech recognition

Speaker Verification and Speaker Recognition

Erorrs False Match Ratio(FMR) False Match Ratio(FMR) False Non-match Rate(FNMR) False Non-match Rate(FNMR) Failure To Enroll Rate Failure To Enroll Rate

FMR System gives false +ve matching a user biometrics with another user's biometrics. Type 1 error System gives false +ve matching a user biometrics with another user's biometrics. Type 1 error Occurs when two people have high degree of similarity Occurs when two people have high degree of similarity It may used to eliminate the non matches. And continue the process again. It may used to eliminate the non matches. And continue the process again.

FNR User’s templates is matched with the enrolled templates and an incorrect decision of non match is made. Type 2 error User’s templates is matched with the enrolled templates and an incorrect decision of non match is made. Type 2 error Due to environment, aging, sickness. Due to environment, aging, sickness.

FER Biometric data of some user may not be clear. Biometric data of some user may not be clear.

Technology The various technologies used to process and store voice prints include frequency estimation, hidden Markov models, gaussian mixture models, pattern matching algorithms, neural networks, matrix representation and decision trees. Some systems also use "anti- speaker" techniques, such as cohort models, and world models. The various technologies used to process and store voice prints include frequency estimation, hidden Markov models, gaussian mixture models, pattern matching algorithms, neural networks, matrix representation and decision trees. Some systems also use "anti- speaker" techniques, such as cohort models, and world models.frequency estimationhidden Markov models neural networksmatrix representation decision treesfrequency estimationhidden Markov models neural networksmatrix representation decision trees

VQ Speaker Verification Speech Feature Extraction

Mel Frequency Cepstral Coefficients

Cepstral Coefficients Power of the triangular filter = summarized Power of the triangular filter = summarized Log calculated Log calculated Convert them to time domain using the Discrete Cosine Transform (DCT) Convert them to time domain using the Discrete Cosine Transform (DCT) Result is called the mel frequency cepstral coefficients (MFCC). Result is called the mel frequency cepstral coefficients (MFCC).

Verification Threshold Threshold Cohort Speakers Cohort Speakers Ratio Ratio

Speaker Verification and Speaker Recognition Accessing confidential information areas Accessing confidential information areas Access to remote computers Access to remote computers Voice dialing Voice dialing Banking by telephone Banking by telephone Telephone shopping Telephone shopping Database access services Database access services Information services Information services Voice mail Voice mail PIN code for your ATM PIN code for your ATM