Combined speech recognition and speaker verification over the fixed and mobile telephone networks

Anastasis Kounoudes, Anixi Antonakoudi, Vassilis Kekatos, Philippos Peleties

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

A double-digit text-dependent speaker verification and text validation system is presented for use in telephone services. The system utilizes concatenated phoneme HMMs for both speech recognition and user authentication, and works in a soundprompted mode. Tests with Hidden Markov Models (HMMs) using Perceptual Linear Prediction (PLP) and Mel Frequency Cepstral Coefficients (MFCC) as well as Cepstral Mean Subtraction (CMS) are performed to assess their effect on recognition performance. The paper also studies the effects of various factors such as the length of the training data, the number of embedded re-estimations and Gaussian mixtures in training of the HMMs, the use of world models, bootstrapping, and user-depended thresholds on the performance of speech recognition and speaker verification.

Original languageEnglish (US)
Title of host publicationProceedings of the Third IASTED International Conference on Signal Processing, Pattern Recognition, and Applications
Pages228-233
Number of pages6
StatePublished - 2006
Externally publishedYes
Event3rd IASTED International Conference on Signal Processing, Pattern Recognition, and Applications - Innsbruck, Austria
Duration: Feb 15 2006Feb 17 2006

Publication series

NameProceedings of the Third IASTED International Conference on Signal Processing, Pattern Recognition, and Applications
Volume2006

Other

Other3rd IASTED International Conference on Signal Processing, Pattern Recognition, and Applications
Country/TerritoryAustria
CityInnsbruck
Period2/15/062/17/06

Keywords

  • Biometrics
  • Hidden markov models
  • Speaker verification
  • Text validation

Fingerprint

Dive into the research topics of 'Combined speech recognition and speaker verification over the fixed and mobile telephone networks'. Together they form a unique fingerprint.

Cite this