Voice Biometric for Learner Authentication: Biometric Authentication

Voice Biometric for Learner Authentication: Biometric Authentication

Kamaraj A. (Mepco Schlenk Engineering College, India), Selva Nidhyananthan S (Mepco Schlenk Engineering College, India) and Kalyana Sundaram C. (Mepco Schlenk Engineering College, India)
Copyright: © 2019 |Pages: 32
DOI: 10.4018/978-1-5225-7724-9.ch007
OnDemand PDF Download:
No Current Special Offers


The objective of this chapter is to verify the identity of the claimed learner by extracting the prosodic features of the speech signal. TIMIT Acoustic-Phonetic Continuous Speech Corpus is used for learner verification using prosodic and articulation features such as energy, pitch, and formants. The prosodic feature includes pitch (F0), and articulation feature includes formants (F1-F7). From this database, for this project in the training phase, 200 learners were used and in the testing phase 160 learners were used. The pitch and formants were extracted using linear predictive analysis. The first seven formants were used for verification purpose. The feature set consists of eight features. The features are fed into the Guassian mixture model. In the Gaussian mixture model, parameters are estimated from the training and testing data using the iterative expectation-maximization. Log likelihood score is computed using these parameters, and then these scores are normalized to make decisions. The decision is made based on the threshold.
Chapter Preview


Learner verification system must decide if a Learner is the person he/she claims to be. The person wishing to be verified first enters his claimed identity, and then on request from the verification system utters his verification phrase, and requests some decisions to be made in the event he is verified. The spoken utterance is processed to obtain a pattern which is compared to the stored reference pattern and then based on decision, accept or reject the claimed Learner. The major advantage of Learner verification system is voice mail, telephone banking, security purpose, authentication etc. The most important application is the forensics.

Complete Chapter List

Search this Book: