Abstract
This research shows the improvement obtained by including the principal component analysis as part of the feature production in the generation of a speech key. The main architecture includes an automatic segmentation of speech and a classifier. The first one, by using a forced alignment configuration, computes a set of primary features, obtains a phonetic acoustic model, and finds the beginnings and ends of the phones in each utterance. The primary features are then transformed according to both the phone model parameters and the phones segments per utterance. Before feeding these processed features to the classifier, the principal component analysis algorithm is applied to the data and a new set of secondary features is built. Then a support vector machine classifier generates an hyperplane that is capable to produce a phone key. Finally, by performing a phone spotting technique, the key is hardened. In this research the results for 10, 20 and 30 users are given using the YOHO database. 90% accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Campbell Jr., J.P.: Features and Measures for Speaker Recognition. Ph.D. Dissertation, Oklahoma State University (1992)
Beringer, N., Schiel, F.: Independent Automatic Segmentation of Speech by Pronunciation Modeling. In: Proc. of the ICPhS 1999, San Francisco, August 1999, pp. 1653–1656 (1999)
Binnenpoorte, D., Goddijn, S., Cucchiarini, C.: How to Improve Human and Machine Transcriptions of Spontaneous Speech. In: Proceedings ISCA and IEEE Workshop on Spontaneous Speech Processing and Recognition (SSPR), Tokyo, Japan, April 2003, pp. 147–150 (2003)
Cortes, C., Vapnik, V.: Support-vector network. Machine Learning 20, 273–297 (1995)
Furui, S.: Digital Speech Processing, Synthesis, and Recognition. Marcel Dekker, New York (2001)
Huang, X., Acero, A., Hon, H.: Spoken Language Processing: A Guide to Theory, Algorithm and System Development. Prentice-Hall, Upper Saddle River (2001)
Higgins, A., Porter, J.J., Bahler, L.: YOHO Speaker Authentication Final Report. ITT Defense Communications Division (1989)
Young, S., Woodland, P.: HTK Hidden Markov Model Toolkit home page, http://htk.eng.cam.ac.uk/
Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation From Voice. In: Proceedings of the IEEE Conference on Security and Privacy, Oakland, CA (2001)
Osuna, E., Freund R., Girosi F.: Support vector machines: Training and applications. Technical Report AIM-1602, MIT A.I. Lab. (1996)
Osuna, E., Freund, R., Girosi, F.: Training Support Vector Machines: An Application to Face Recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 130–136 (1997)
Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257–286 (1989)
Rabiner, L.R., Juang, B.-H.: Fundamentals of speech recognition. Prentice-Hall, New-Jersey (1993)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6) (2004)
Joachims, T.: SVMLight: Support Vector Machine, SVM-Light Support Vector Machine, University of Dortmund (1999), http://svmlight.joachims.org/
Wan, V., Renals, S.: Speaker Verification Using Sequence Discriminant Support Vector Machines. IEEE Transactions on speech and audio processing 13(2) (March 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nolazco-Flores, J.A., Mex-Perera, J.C., Garcia-Perera, L.P., Sanchez-Torres, B. (2006). Using PCA to Improve the Generation of Speech Keys. In: Gelbukh, A., Reyes-Garcia, C.A. (eds) MICAI 2006: Advances in Artificial Intelligence. MICAI 2006. Lecture Notes in Computer Science(), vol 4293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11925231_104
Download citation
DOI: https://doi.org/10.1007/11925231_104
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49026-5
Online ISBN: 978-3-540-49058-6
eBook Packages: Computer ScienceComputer Science (R0)