SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Speaker Verification
using Oguma Histogram


  S117036   Ami Inoamta

  Supervisor:M.Sugiyama
Outline
●   Background
●   Speaker verification algorithm
●   Oguma histogram
●   Speech analysis condition
●   Learn histogram , Verification histogram
●   Result of speaker verification
Background
●   Diffusion of smartphone.
●   Security is more important.
    →Speaker verification system

●   VQ : most popular. But calculation amount is large.
●   Oguma histogram : calculation amount is small.
    →smartphone application.


●   First, test this performance in PC terminal.
Speaker verification algorithm




         Figure1: Speaker verification algorithm.
Oguma histogram calculation
                                     ●   Do not use VQ.
                                     ●   Directly make histogram
                                         from feature vectors.
                                         1. Set out threshold in each
                                         dimension of feature
                                         vectors.
                                         2. Compare
                                         →Space division
                                         3.Set out Region ID .
Figure2:Concept of Oguma histogram
Speech analysis condition
        Database                   TIMIT
     Dialect region             New England
       Head count                10 person
 Learning , verification   5 sentence , 5 sentence
    Recording format                wav
     Sampling rate                 16 kHz
Dimension number of MFCC             16
   Filter bank channel               24
      Window size                  16 ms
      Frame shift               8 ms, 16 ms
  Dimension number of            16, 32, 64,
       histogram           128,256,512,1024,2048,
                                 4096,8192
Learn histogram,Verification histogram




               Figure3:Histogram.
Result of speaker verification



           Figure4:Result(frame shift 8ms).




           Figure5:Result(frame shift 16ms).

Weitere ähnliche Inhalte

Andere mochten auch

media studies house style
media studies house stylemedia studies house style
media studies house styleshadiorr
 
Syllabus etica y responsabilidad social presencial
Syllabus etica y responsabilidad social presencialSyllabus etica y responsabilidad social presencial
Syllabus etica y responsabilidad social presencialMilber Fuentes
 
Las relaciones entre_la_etica_y_la_politica
Las relaciones entre_la_etica_y_la_politicaLas relaciones entre_la_etica_y_la_politica
Las relaciones entre_la_etica_y_la_politicaMilber Fuentes
 
Syllabus etica y formción ciudadana presencial
Syllabus etica y formción ciudadana presencialSyllabus etica y formción ciudadana presencial
Syllabus etica y formción ciudadana presencialMilber Fuentes
 
Zygmunt bauman-trabajo-consumismo-y-nuevos-pobres-libro-completo
Zygmunt bauman-trabajo-consumismo-y-nuevos-pobres-libro-completoZygmunt bauman-trabajo-consumismo-y-nuevos-pobres-libro-completo
Zygmunt bauman-trabajo-consumismo-y-nuevos-pobres-libro-completoMilber Fuentes
 
Razon y dominacion_la_legitimidad_en_web
Razon y dominacion_la_legitimidad_en_webRazon y dominacion_la_legitimidad_en_web
Razon y dominacion_la_legitimidad_en_webMilber Fuentes
 

Andere mochten auch (6)

media studies house style
media studies house stylemedia studies house style
media studies house style
 
Syllabus etica y responsabilidad social presencial
Syllabus etica y responsabilidad social presencialSyllabus etica y responsabilidad social presencial
Syllabus etica y responsabilidad social presencial
 
Las relaciones entre_la_etica_y_la_politica
Las relaciones entre_la_etica_y_la_politicaLas relaciones entre_la_etica_y_la_politica
Las relaciones entre_la_etica_y_la_politica
 
Syllabus etica y formción ciudadana presencial
Syllabus etica y formción ciudadana presencialSyllabus etica y formción ciudadana presencial
Syllabus etica y formción ciudadana presencial
 
Zygmunt bauman-trabajo-consumismo-y-nuevos-pobres-libro-completo
Zygmunt bauman-trabajo-consumismo-y-nuevos-pobres-libro-completoZygmunt bauman-trabajo-consumismo-y-nuevos-pobres-libro-completo
Zygmunt bauman-trabajo-consumismo-y-nuevos-pobres-libro-completo
 
Razon y dominacion_la_legitimidad_en_web
Razon y dominacion_la_legitimidad_en_webRazon y dominacion_la_legitimidad_en_web
Razon y dominacion_la_legitimidad_en_web
 

Ähnlich wie S1170136 week9

HMM based Automatic Arabic Sign Language Translator using
HMM based Automatic Arabic Sign Language Translator usingHMM based Automatic Arabic Sign Language Translator using
HMM based Automatic Arabic Sign Language Translator usingعمر أمين
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video SurveillanceKobi Magnezi
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Google and SRI talk September 2016
Google and SRI talk September 2016Google and SRI talk September 2016
Google and SRI talk September 2016Hagai Aronowitz
 
H04011 04 5361
H04011 04 5361H04011 04 5361
H04011 04 5361IJMER
 
The Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemThe Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemReza Rahimi
 
lesson 2 digital data acquisition and data processing
lesson 2 digital data acquisition and data processinglesson 2 digital data acquisition and data processing
lesson 2 digital data acquisition and data processingMathew John
 
Gsm Soft Viterbi Code
Gsm Soft Viterbi CodeGsm Soft Viterbi Code
Gsm Soft Viterbi Codefrankie_z
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
 
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov ModelA Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov ModelIDES Editor
 
Dcase2016 oral presentation - Experiments on DCASE 2016: Acoustic Scene Class...
Dcase2016 oral presentation - Experiments on DCASE 2016: Acoustic Scene Class...Dcase2016 oral presentation - Experiments on DCASE 2016: Acoustic Scene Class...
Dcase2016 oral presentation - Experiments on DCASE 2016: Acoustic Scene Class...Ankit Shah
 
journal publishing, how to publish research paper, Call For research paper, i...
journal publishing, how to publish research paper, Call For research paper, i...journal publishing, how to publish research paper, Call For research paper, i...
journal publishing, how to publish research paper, Call For research paper, i...IJERD Editor
 
Intro to Micr0wind Sofware
Intro to Micr0wind Sofware Intro to Micr0wind Sofware
Intro to Micr0wind Sofware ZunAib Ali
 
Unsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overviewUnsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overviewRidge-i, Inc.
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1Omkar Salunke
 
Using Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry VideoUsing Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry VideoJun Steed Huang
 

Ähnlich wie S1170136 week9 (20)

HMM based Automatic Arabic Sign Language Translator using
HMM based Automatic Arabic Sign Language Translator usingHMM based Automatic Arabic Sign Language Translator using
HMM based Automatic Arabic Sign Language Translator using
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video Surveillance
 
Speaker recognition.
Speaker recognition.Speaker recognition.
Speaker recognition.
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Google and SRI talk September 2016
Google and SRI talk September 2016Google and SRI talk September 2016
Google and SRI talk September 2016
 
H04011 04 5361
H04011 04 5361H04011 04 5361
H04011 04 5361
 
The Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemThe Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management System
 
Conv-TasNet.pdf
Conv-TasNet.pdfConv-TasNet.pdf
Conv-TasNet.pdf
 
lesson 2 digital data acquisition and data processing
lesson 2 digital data acquisition and data processinglesson 2 digital data acquisition and data processing
lesson 2 digital data acquisition and data processing
 
Gsm Soft Viterbi Code
Gsm Soft Viterbi CodeGsm Soft Viterbi Code
Gsm Soft Viterbi Code
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
ASR_final
ASR_finalASR_final
ASR_final
 
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov ModelA Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
 
Dcase2016 oral presentation - Experiments on DCASE 2016: Acoustic Scene Class...
Dcase2016 oral presentation - Experiments on DCASE 2016: Acoustic Scene Class...Dcase2016 oral presentation - Experiments on DCASE 2016: Acoustic Scene Class...
Dcase2016 oral presentation - Experiments on DCASE 2016: Acoustic Scene Class...
 
journal publishing, how to publish research paper, Call For research paper, i...
journal publishing, how to publish research paper, Call For research paper, i...journal publishing, how to publish research paper, Call For research paper, i...
journal publishing, how to publish research paper, Call For research paper, i...
 
fushne99wtkxa3efxt9o.pdf
fushne99wtkxa3efxt9o.pdffushne99wtkxa3efxt9o.pdf
fushne99wtkxa3efxt9o.pdf
 
Intro to Micr0wind Sofware
Intro to Micr0wind Sofware Intro to Micr0wind Sofware
Intro to Micr0wind Sofware
 
Unsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overviewUnsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overview
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Using Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry VideoUsing Transcendental Number to Encrypt BlackBerry Video
Using Transcendental Number to Encrypt BlackBerry Video
 

S1170136 week9

  • 1. Speaker Verification using Oguma Histogram S117036 Ami Inoamta Supervisor:M.Sugiyama
  • 2. Outline ● Background ● Speaker verification algorithm ● Oguma histogram ● Speech analysis condition ● Learn histogram , Verification histogram ● Result of speaker verification
  • 3. Background ● Diffusion of smartphone. ● Security is more important. →Speaker verification system ● VQ : most popular. But calculation amount is large. ● Oguma histogram : calculation amount is small. →smartphone application. ● First, test this performance in PC terminal.
  • 4. Speaker verification algorithm Figure1: Speaker verification algorithm.
  • 5. Oguma histogram calculation ● Do not use VQ. ● Directly make histogram from feature vectors. 1. Set out threshold in each dimension of feature vectors. 2. Compare →Space division 3.Set out Region ID . Figure2:Concept of Oguma histogram
  • 6. Speech analysis condition Database TIMIT Dialect region New England Head count 10 person Learning , verification 5 sentence , 5 sentence Recording format wav Sampling rate 16 kHz Dimension number of MFCC 16 Filter bank channel 24 Window size 16 ms Frame shift 8 ms, 16 ms Dimension number of 16, 32, 64, histogram 128,256,512,1024,2048, 4096,8192
  • 8. Result of speaker verification Figure4:Result(frame shift 8ms). Figure5:Result(frame shift 16ms).