Presentation is loading. Please wait.

Presentation is loading. Please wait.

Supervisor: Dr. Eddie Jones Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification System for Security.

Similar presentations


Presentation on theme: "Supervisor: Dr. Eddie Jones Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification System for Security."— Presentation transcript:

1 Supervisor: Dr. Eddie Jones Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification System for Security Applications

2 Contents What is a Speech Recognition/Verification System How Speech Recognition Works How Speech Verification Works Basics Milestones Timeline Questions

3 What is a Speech Recognition/Verification System Speech recognition applications include voice dialing (e.g., "Call home”) Speech Recognition converts spoken words to a digital signal, this signal is then converted to very short waveforms and then compares these to a database of known pronunciations, called Phonemes. This is then used to recognise the word that was spoken. Speech verification applications try to verify correctness of pronunciation. Speech verification doesn’t try to decode unknown speech, but instead, knowing what speech is to be said, it attempts to match the known sentences pitch, pronunciation etc. with that of a stored speakers pitch, pronunciation etc.

4 How Speech Recognition Works Speech at its basic level is broken down to phonemes – A representation of the sound we make and put together to form sentences. When the analogue speech is converted to a digital signal it is divided into small segments as short as a few 100 ths of a second. These segments are then matched to know phonemes (~40 in the English language). A program will then examine phonemes in the context of other phonemes around them.

5 How Speech Verification Works There are essentially 4 different types of speech verification: 1. Fixed Phrase Verification – One fixed phrase is stored and when verifying, that phrase is used to identify the user. 2. Fixed Vocabulary Verification – Multiple phrases are stored and when verifying, one at random is used to identify the user. 3. Flexible Vocabulary Verification – During system training using phrases, a set of subwords are generated and can be used during verification. 4. Text Independent Verification – The system learns the users voice (pitch, dialect, pronunciation, tone etc.) and in verification the user is free to say anything he/she wishes and the system recognises their voice.

6 Basics Training – Recording multiple speakers saying many varying sentences. This will then be analysed and stored for future recognition. Certain speakers will have a higher security level and this can be used in security applications. Recognition – Setting the system to recognition mode and reading out the sentence provided. If a match is found, access to a secured location is granted, if not, the user must try again, or does not have access.

7 Basic Block Diagram of Training Training Sample sentence Analysed Stored Voice 2 Stored Voice 1 Note: There will be multiple stored voices for speech verification

8 Basic Block Diagram of Verification Recognition Read a Previously recorded sentence Analysed Compared to stored voices Matches with a stored voice Unknown voice fails Passes Security check

9 Milestones 1. Research into Speaker Recognition/Verification and simulate on Various FEP in Matlab. 2. Simulation of classifier(s), and baseline performance evaluation of system. 3. Investigate speaker recognition/Verification over the Internet. Simulation of channel errors and additive noise. 4. Investigation of real-time implementation, including selecting a suitable development platform. Translation to C with a view to real-time implementation and functional verification against the Matlab reference. 5. Development of a real-time version of the system.

10 Timeline Milestone 1: Mid-Late November Milestone 2: Mid January Milestone 3: February (Pending research) Milestone 4: Early March Milestone 5: Late March

11 Questions?


Download ppt "Supervisor: Dr. Eddie Jones Electronic Engineering Department Final Year Project 2008/09 Development of a Speaker Recognition/Verification System for Security."

Similar presentations


Ads by Google