COMPUTER SYSTEM FOR ACCESS CONTROL USING AUTHENTICATION BY VOICE
Keywords:
voice, speaker identification, voice authorization, access control, voice feature vector.Abstract
The article is devoted to techniques and algorithms for voice identification and development of computer access control system that allows to improve the standard password system by establishing mechanisms for voice authorization. Improved algorithm for the selection of fragments of the voice in the audiofiles. Designed the scheme of storing users voice data for further use during the authorization and designed the access control system for voice authorization, which allows to determine the fact of belonging language user-defined sequence and investigated the performance of the developed hardware and software.
Downloads
References
2. Е.А. Первушин. Обзор основных методов распознавания дикторов. [Електронний ресурс] Режим доступу: http://msm.univer.omk.su/jrn2324/pervushinOverview.pdf.
3. Л.Р. Рабинер. Цифровая обработка речевых сигналов / Л.Р. Рабинер, Р.В. Шафер. - М.: Радио и связь, 1981.
4. Reynolds D. A. Speaker identication and verication using Gaussian mixture speaker models / D. A. Reynolds. – Helsinki: Speech Commun, 1995.
5. Kinnunen T. Spectral Features for Automatic Text-independent Speaker Recognition / T. Kinnunen. – Helsinki: Gaudeamus, 2013.
6. Bishop C. Pattern Recognition and Machine Learning / C. Bishop. – New-York: Business Media, 2006.
7. Campbell J.P. Speaker Recognition: A Tutorial // Proceedings of the IEEE. - 1997. - Vol. 85. - P. 1437-1462.
8. Садыхов Р.Х. Модели гауссовых смесей для верификации диктора по произвольной речи / Р.Х. Садыхов, В.В. Ракуш. – Минск: Белкнига, 2003.
9. Przybocki M. The NIST 1999 Speaker Recognition Evaluation – An Overview // Digital Signal Processing. - 2000. - Vol. 10.