Method for estimating distinguish of voice, registering and validating authentication of speaker and apparatus thereof

A speaker authentication and resolution technology, applied in the field of information processing, can solve the problems of weak speaker resolution, inconvenient, checking password validity, etc.

Inactive Publication Date: 2007-05-16
KK TOSHIBA
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, it is very inconvenient for users to use such a system
[0004] On the other hand, some phonemes or syllables present in the cipher may be poorly discernible to the speaker
However, most of the current systems do not have the function of checking the validity of the password at the time of registration

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for estimating distinguish of voice, registering and validating authentication of speaker and apparatus thereof
  • Method for estimating distinguish of voice, registering and validating authentication of speaker and apparatus thereof
  • Method for estimating distinguish of voice, registering and validating authentication of speaker and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Various preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0021] FIG. 1 is a flowchart of an enrollment method for speaker authentication according to an embodiment of the present invention. As shown in FIG. 1 , first at step 101 , a voice including a password uttered by a speaker is input. Here, in this embodiment, it is not necessary for the system administrator or developer and the speaker (user) to agree on the content of the password in advance as in the prior art, but the content of the password can be determined by the user and then spoken out.

[0022] Next, in step 105, acoustic features are extracted from the speech. Specifically, in this embodiment, an MFCC (Mel Frequency Cepstrum Coefficient, Mel Frequency Cepstral Coefficient) method is used to represent the acoustic features of speech. However, it should be pointed out that the present invention is not particularly limited to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides one speaker identification register method and device, test method and device, sound evaluation resolution method and identification system, wherein, the method comprises the following steps: inputting speaker sound; getting sound sequence according to above input sound; according to sound resolution list evaluating sound sequence resolution rate, wherein, the above sound resolution list comprises each sound resolution force as valve value; providing sound module to sound.

Description

technical field [0001] The present invention relates to information processing technology, in particular to speaker authentication (speaker authentication) and technology for evaluating speech resolution. Background technique [0002] Different speakers can be identified by using the pronunciation characteristics of each person when they speak, so that speaker authentication can be performed. In the article "Speaker recognition using hidden Markov models, dynamic time warping and vector quantification" published by K.Yu, J.Mason, J.Oglesby (Vision, Image and Signal Processing, IEEProceedings, Vol.142, Oct.1995, pp.313- 18) introduced three common speaker recognition engine technologies: HMM, DTW and VQ. [0003] Usually, a speaker verification system includes two parts: enrollment and evaluation. In the past, using the above-mentioned speaker recognition technology, in order to realize a highly reliable speaker authentication system (such as a system based on HMM), the reg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L17/00G10L15/00
CPCG10L17/04
Inventor 栾剑郝杰
Owner KK TOSHIBA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products