3. Recent data on mobile phone users all over the
world, the number of telephone landlines in
operation, and recent VoIP (Voice over IP networks)
deployments , confirm that voice is the most
accessible biometric trait as no extra acquisition
device or transmission system is needed ,This fact
gives voice an advantage over other
4. biometric traits, especially when remote users or
systems are taken into account.
However, the voice trait is not only related with
personal characteristics, but also with many
environmental and sociolinguistic variables
as voice generation is the result of an extremely
complex process
5. three major types of applications which take
advantage of the biometric information
present in the speech signal
(access control, typically
remote by phone) and background recognition
(natural voice checking)
(e.g. blacklisting
detection in call centers or wiretapping and
surveillance)
6. (use of the
voice as evidence in courts of law or as
intelligence in police investigations)
other applications:-
for physical access entry into a
building
use voice-enabling services
8. • The main source of information encoded in the voice
signal is the linguistic content.
we can distinguish two
very different types of speaker recognition
technologies
9. requires the speaker saying exactly the enrolled or given
password
can be classified into two types
the lexical content in the enrollment and the recognition
samples is always the same. where the user is required to
utter an specific key-phrase or sequence (e.g., ”12-34-56”)
the lexical content in the recognition sample is different
in every access trial from the lexical content of the
enrollment samples
10. are used for speaker
identification as they require very little if any
cooperation by the speaker.
In this case the text during enrollment and test is
different.
As text-independent technologies do not compare
what was said at enrollment and verification,
verification applications tend to also employ speech
recognition to determine what the user is saying at
the point of authentication.
11.
12. In this section, we will deal with how the speaker
specificities are embedded into the speech signal.
Speech production is a extremely complex process
whose result depends on many variables at different
levels, including from
13. (e.g. level of education, linguistic context and dialectal
differences)
(e.g. vocal tract length, shape and tissues and the
dynamic configuration of the articulatory organs)
14. • The first step in the construction of automatic
speaker recognition systems is the reliable extraction
of features and tokens that contain identifying
information of interest.
In order to perform reliable spectral analysis, signals
must show stationary properties that are not easy to
observe in constantly changing speech signals
15. Voice authentication is easy to use and easily
accepted by users
voice biometrics is only biometric that allows users
to authenticate remotely
It is quick to enroll in a voice authentication system
and the storage size of the voice print is small
The possibility to identify the psychological state of a
person .
16. Less accuracy , subject to background
noise.
The human voice variability, due to colds,
and simple tiredness.
Age plays a role in changing the sound of
the person.
The mental state of the person affect his
voice
17. cheaper device
very easy
: Medium
:This is done by matching registration with the speaker's voice
behavioral characteristics
Applied in banks and to enter the buildings and the
company's entry.
is accepte by the people.
in real time
The database you need to update it to the person's age variable
maintenance for the hardware and software.