Essays about: "voice authentication"

Showing result 1 - 5 of 16 essays containing the words voice authentication.

  1. 1. A performance measurement of a Speaker Verification system based on a variance in data collection for Gaussian Mixture Model and Universal Background Model

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Zeid Bekli; William Ouda; [2018]
    Keywords : Speaker recognition; Speaker Verification; Speaker authentication; Speaker classification; Gaussian mixture model; Gaussian Mixture Model-Universal Background Model; Biometric System; Equal Error Rate; False Negative Rate; False Positive Rate; Mel Frequency Cepstrum Coefficients;

    Abstract : Voice recognition has become a more focused and researched field in the last century,and new techniques to identify speech has been introduced. A part of voice recognition isspeaker verification which is divided into Front-end and Back-end. READ MORE

  2. 2. Machine Learning for Text-Independent Speaker Verification : How to Teach a Machine to RecognizeHuman Voices

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Stefano Imoscopi; [2016]
    Keywords : ;

    Abstract : The aim of speaker recognition and veri cation is to identify people's identity from the characteristics of their voices (voice biometrics). Traditionally this technology has been employed mostly for security or authentication purposes, identi cation of employees/customers and criminal investigations. READ MORE

  3. 3. Seamless speaker recognition

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Anargyros Chatzaras; Georgios Savvidis; [2015]
    Keywords : speaker recognition; user authentication; seamless operation; biometrics; standalone; client-server; Android; talarigenkänning; användarautentisering; sömlös drift; biometri; fristående; klient-server; Android;

    Abstract : In a technologically advanced society, the average person manages dozens of accounts for e-mail, social networks, e-banking, and other electronic services. As the number of these accounts increases, the need for automatic user identification becomes more essential. READ MORE

  4. 4. Developing UCAF, an administrative functionality for the U-Call IVR reporting system

    University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Author : Asreen Rostami; [2014]
    Keywords : ICT4D; IVR; Semantic Tagging; VoIP Drupal; UCAF; U-Call;

    Abstract : Mobile phones and Interactive Voice Response (IVR) applications are being progressively used in developing countries to collect voice-based reports about bad governance or poor public service delivery, reported by citizens. Such systems (e.g. Avaaj Otalo, Foroba Blon, etc. READ MORE

  5. 5. Biometrics Technology : Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Irfan Iqbal; Bilal Qadir; [2012]
    Keywords : Biometrics Technology; Attitudes influencing factors; Blekinge healthcare;

    Abstract : Context. Biometric technology is a secure and convenient identification method and it does not need to remember complex passwords, nor smart cards, keys, and the like. Biometrics is the measurable characteristics of individuals based on their behavioral patterns or physiological features that can be used to verify or recognize their identity. READ MORE