Department of Communication Technology 30/08/2004 1 A Comparative Study of Feature-Domain Error Concealment Techniques for Distributed Speech Recognition.

Slides:



Advertisements
Similar presentations
Improved ASR in noise using harmonic decomposition Introduction Pitch-Scaled Harmonic Filter Recognition Experiments Results Conclusion aperiodic contribution.
Advertisements

Data Mining Feature Selection. Data reduction: Obtain a reduced representation of the data set that is much smaller in volume but yet produces the same.
Computer Networking Error Control Coding
Toward Automatic Music Audio Summary Generation from Signal Analysis Seminar „Communications Engineering“ 11. December 2007 Patricia Signé.
2005/12/06OPLAB, Dept. of IM, NTU1 Optimizing the ARQ Performance in Downlink Packet Data Systems With Scheduling Haitao Zheng, Member, IEEE Harish Viswanathan,
Histogram-based Quantization for Distributed / Robust Speech Recognition Chia-yu Wan, Lin-shan Lee College of EECS, National Taiwan University, R. O. C.
Yi Liang Department of Electrical Engineering Stanford University April 19, 2000 Loss Recovery and Adaptive Playout Control for Packet Voice Communications.
Hidden Markov Models Theory By Johan Walters (SR 2003)
Cellular Communications
Compressive Oversampling for Robust Data Transmission in Sensor Networks Infocom 2010.
Recursive End-to-end Distortion Estimation with Model-based Cross-correlation Approximation Hua Yang, Kenneth Rose Signal Compression Lab University of.
On Recognizing Music Using HMM Following the path craved by Speech Recognition Pioneers.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
HIWIRE Progress Report Trento, January 2007 Presenter: Prof. Alex Potamianos Technical University of Crete Presenter: Prof. Alex Potamianos Technical University.
1 Enhancement of Wi-Fi Communication Systems through Symbol Shaping and Interference Mitigation Presented by Tanim M. Taher Date: Monday, November 26 th,
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Source-Channel Prediction in Error Resilient Video Coding Hua Yang and Kenneth Rose Signal Compression Laboratory ECE Department University of California,
Laurent Itti: CS599 – Computational Architectures in Biological Vision, USC Lecture 7: Coding and Representation 1 Computational Architectures in.
Direct Access Video Streaming Scheme Supporting Effective Error Concealment Chun-Ming Huang, Kai-Chao Yang and Jia-Shung Wang.
A Survey of Packet Loss Recovery Techniques for Streaming Audio Colin Perkins, Orion Hodson, and Vicky Hardman University College London IEEE Network.
Department of Communication Technology A Subvector-Based Error Concealment Algorithm for Speech Recognition over Mobile Networks - ICASSP 2004, Montreal,
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
HMM-BASED PSEUDO-CLEAN SPEECH SYNTHESIS FOR SPLICE ALGORITHM Jun Du, Yu Hu, Li-Rong Dai, Ren-Hua Wang Wen-Yi Chu Department of Computer Science & Information.
Summarized by Soo-Jin Kim
„Bandwidth Extension of Speech Signals“ 2nd Workshop on Wideband Speech Quality in Terminals and Networks: Assessment and Prediction 22nd and 23rd June.
Does Packet Replication Along Multipath Really Help ? Swades DE Chunming QIAO EE Department CSE Department State University of New York at Buffalo Buffalo,
Improving Utterance Verification Using a Smoothed Na ï ve Bayes Model Reporter : CHEN, TZAN HWEI Author :Alberto Sanchis, Alfons Juan and Enrique Vidal.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 4 Channel Coding.
Hierarchical Dirichlet Process (HDP) A Dirichlet process (DP) is a discrete distribution that is composed of a weighted sum of impulse functions. Weights.
Minimum Mean Squared Error Time Series Classification Using an Echo State Network Prediction Model Mark Skowronski and John Harris Computational Neuro-Engineering.
17.0 Distributed Speech Recognition and Wireless Environment References: 1. “Quantization of Cepstral Parameters for Speech Recognition over the World.
November 1, 2005IEEE MMSP 2005, Shanghai, China1 Adaptive Multi-Frame-Rate Scheme for Distributed Speech Recognition Based on a Half Frame-Rate Front-End.
CODING/DECODING CONCEPTS AND BLOCK CODING. ERROR DETECTION CORRECTION Increase signal power Decrease signal power Reduce Diversity Retransmission Forward.
ECE 8443 – Pattern Recognition LECTURE 10: HETEROSCEDASTIC LINEAR DISCRIMINANT ANALYSIS AND INDEPENDENT COMPONENT ANALYSIS Objectives: Generalization of.
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 12.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
Coding Theory. 2 Communication System Channel encoder Source encoder Modulator Demodulator Channel Voice Image Data CRC encoder Interleaver Deinterleaver.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: ML and Simple Regression Bias of the ML Estimate Variance of the ML Estimate.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Reestimation Equations Continuous Distributions.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
TI Cellular Mobile Communication Systems Lecture 4 Engr. Shahryar Saleem Assistant Professor Department of Telecom Engineering University of Engineering.
Advancing Wireless Link Signatures for Location Distinction Mobicom 2008 Junxing Zhang, Mohammad H. Firooz Neal Patwari, Sneha K. Kasera University of.
Page 1 The department of Information & Communications Engineering Dong-uk, kim A Survey of Packet Loss Recovery Techniques for Streaming.
A Semi-Blind Technique for MIMO Channel Matrix Estimation Aditya Jagannatham and Bhaskar D. Rao The proposed algorithm performs well compared to its training.
1 CRANDEM: Conditional Random Fields for ASR Jeremy Morris 11/21/2008.
Error Detection and Correction – Hamming Code
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Elements of a Discrete Model Evaluation.
Data Communications and Networking
A New Approach to Utterance Verification Based on Neighborhood Information in Model Space Author :Hui Jiang, Chin-Hui Lee Reporter : 陳燦輝.
RCC-Mean Subtraction Robust Feature and Compare Various Feature based Methods for Robust Speech Recognition in presence of Telephone Noise Amin Fazel Sharif.
From Error Control to Error Concealment Dr Farokh Marvasti Multimedia Lab King’s College London.
Basic Theory (for curve 01). 1.1 Points and Vectors  Real life methods for constructing curves and surfaces often start with points and vectors, which.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
Hidden Markov Models. A Hidden Markov Model consists of 1.A sequence of states {X t |t  T } = {X 1, X 2,..., X T }, and 2.A sequence of observations.
Spatial Databases: Spatio-Temporal Databases Spring, 2015 Ki-Joune Li.
Channel Coding and Error Control 1. Outline Introduction Linear Block Codes Cyclic Codes Cyclic Redundancy Check (CRC) Convolutional Codes Turbo Codes.
1 LOW-RESOURCE NOISE-ROBUST FEATURE POST-PROCESSING ON AURORA 2.0 Chia-Ping Chen, Jeff Bilmes and Katrin Kirchhoff SSLI Lab Department of Electrical Engineering.
Parallel Image Processing: Active Contour Algorithm
Smoothing Serial Data.
Error Recovery.
Supervised Time Series Pattern Discovery through Local Importance
Smoothing Serial Data.
Research Topic Error Concealment Techniques in H.264/AVC for Wireless Video Transmission Vineeth Shetty Kolkeri EE Graduate,UTA.
On the Integration of Speech Recognition into Personal Networks
Direct Sequence Spread Spectrum Modulation and Demodulation using Compressive Sensing Under the guidance of M.Venugopala Rao Submitted by K.Y.K.Kumari.
Handwritten Characters Recognition Based on an HMM Model
Spatial Databases: Spatio-Temporal Databases
Presentation transcript:

Department of Communication Technology 30/08/ A Comparative Study of Feature-Domain Error Concealment Techniques for Distributed Speech Recognition - Robust2004 workshop, Norwich, UK Zheng-Hua Tan, Børge Lindberg and Paul Dalsgaard {zt, bli, Aalborg University, Denmark

Department of Communication Technology 30/08/ Agenda Feature-domain EC techniques –repetition –linear interpolation –subvector concealment Speech recognition experiments Comparative study –MFCC features –Euclidean and DP distances –HMM state durations

Department of Communication Technology 30/08/ Motivation Why to do this work? A variety of EC techniques for DSR occur –A survey Repetition vs. interpolation –Which is better? What makes an EC technique good for recognition?

Department of Communication Technology 30/08/ EC techniques Two classes of EC techniques Client based EC –e.g. retransmission and forward error control (FEC) Server based EC (the redundancy in the transmitted signal is exploited) –in the model-domain Weighted Viterbi, missing feature theory –in the feature-domain Insertion based techniques: splicing, substitution, repetition Interpolation based techniques: linear interpolation Subvector concealment

Department of Communication Technology 30/08/ Subvector concealment Observation1: conventional EC schemes share a common characteristic - conducting EC at the vector level Observation 2: within erroneous vectors, a substantial number of subvectors are often error-free Subvector based EC

Department of Communication Technology 30/08/ Subvector concealment (cont.) The ETSI-DSR standard –Feature-pair and SVQ: The n’th vector is –Frame-pair: Feature-pair Subvector

Department of Communication Technology 30/08/ Buffering matrix Consistency test Subvector concealment (cont.)

Department of Communication Technology 30/08/ Consistency matrix and subvector concealment 0 for inconsistent 1 for consistent C = Subvector concealment (cont.)

Department of Communication Technology 30/08/ Outline Feature-domain EC techniques –repetition –linear interpolation –subvector concealment Speech recognition experiments Comparative study –MFCC features –Euclidean and DP distances –HMM state durations

Department of Communication Technology 30/08/ Recognition experiments two tasks: Danish digits and city names the HTK based reference recogniser the realistic GSM error patterns (EP) : –EP1, 10 dB (C/I ratios ) –EP2, 7 dB –EP3, 4dB

Department of Communication Technology 30/08/ Recognition experiments (cont.) The %WER for three EC techniques (a) Danish digits (b) city names

Department of Communication Technology 30/08/ Outline Feature-domain EC techniques –repetition –linear interpolation –subvector concealment Speech recognition experiments Comparative study –MFCC features –Euclidean and DP distances –HMM state durations

Department of Communication Technology 30/08/ Comparative study - MFCC features Transmission errors of a random BER value of 2% is used. The original error-free MFCC features are directly compared with the features corrupted with errors but concealed either –by repetition –by interpolation –by subvector concealment

Department of Communication Technology 30/08/ Comparative study - MFCC features (cont.) MFCC c0 Two observations

Department of Communication Technology 30/08/ Comparative study - MFCC features (cont.) Interpolation: straight line – constant value segment – zero value segment

Department of Communication Technology 30/08/ Comparative study - MFCC features (cont.) Repetition generated feature curves display similar shapes even though there are some displacements along the time axis as compared to the iMFCC feature. However, the DP embedded in the Viterbi algorithm makes this displacement relatively irrelevant.

Department of Communication Technology 30/08/ Comparative study - DP distances –The Euclidean and DP distances between c 0 of MFCC and MFCC generated by different EC techniques for word “et” –General expectation: interpolation performs better Signal reconstruction vs. speech recognition Euclidean distance vs. DP distance

Department of Communication Technology 30/08/ Comparative study - DP distances (cont.) Over 328 testing utterances Number of smaller distances Subvector EC always gives the smallest for both distances.

Department of Communication Technology 30/08/ Comparative study - HMM state durations Viterbi decoding tracks the HMM state alignment The average state-durations Two facts are observed: –repetition vs. interpolation –subvector vs. error-free

Department of Communication Technology 30/08/ Summary Three different EC techniques compared –the simple repetition technique is as good as or even better than linear interpolation –subvector concealment performs best Comparative study –MFCC features –Euclidean and DP distances –HMM state durations

Department of Communication Technology 30/08/ A Comparative Study of Feature-Domain Error Concealment Techniques for Distributed Speech Recognition Thanks!