Show simple item record

dc.contributor.authorHertlein, Heinz
dc.contributor.authorAriyaeeinia, Aladdin
dc.contributor.authorJeffrey, Zoe
dc.contributor.authorRamalingam, Soodamani
dc.date.accessioned2019-11-13T01:04:52Z
dc.date.available2019-11-13T01:04:52Z
dc.date.issued2019-10-31
dc.identifier.citationHertlein , H , Ariyaeeinia , A , Jeffrey , Z & Ramalingam , S 2019 , Effectiveness in the Realisation of Speaker Authentication . in 2019 International Carnahan Conference on Security Technology (ICCST), CHENNAI, India, 2019 : IEEE ICCST 2019 . , 8888434 , Proceedings - International Carnahan Conference on Security Technology , vol. 2019-October , Institute of Electrical and Electronics Engineers (IEEE) , pp. 1-5 , The IEEE (53rd) International Carnahan Conference on Security Technology , Chennai , India , 1/10/19 . https://doi.org/10.1109/CCST.2019.8888434
dc.identifier.citationconference
dc.identifier.isbn978-1-7281-1575-7
dc.identifier.isbn9781728115764
dc.identifier.issn1071-6572
dc.identifier.urihttp://hdl.handle.net/2299/21884
dc.description© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.description.abstractAn important consideration for the deployment of speaker recognition in authentication applications is the approach to the formation of training and testing utterances . Whilst defining this for a specific scenario is influenced by the associated requirements and conditions, the process can be further guided through the establishment of the relative usefulness of alternative frameworks for composing the training and testing material. In this regard, the present paper provides an analysis of the effects, on the speaker recognition accuracy, of various bases for the formation of the training and testing data. The experimental investigations are conducted based on the use of digit utterances taken from the XM2VTS database. The paper presents a detailed description of the individual approaches considered and discusses the experimental results obtained in different cases.en
dc.format.extent5
dc.format.extent328347
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.ispartof2019 International Carnahan Conference on Security Technology (ICCST), CHENNAI, India, 2019
dc.relation.ispartofseriesProceedings - International Carnahan Conference on Security Technology
dc.subjectBiometric Applications
dc.subjectSpeaker Authentication
dc.subjectSpeaker Recognition
dc.subjectElectrical and Electronic Engineering
dc.subjectLaw
dc.titleEffectiveness in the Realisation of Speaker Authenticationen
dc.contributor.institutionCentre for Engineering Research
dc.contributor.institutionCommunications and Intelligent Systems
dc.contributor.institutionSmart Mobility Unit
dc.contributor.institutionSchool of Physics, Engineering & Computer Science
dc.contributor.institutionDepartment of Engineering and Technology
dc.contributor.institutionSchool of Engineering and Technology
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=85074968415&partnerID=8YFLogxK
rioxxterms.versionofrecord10.1109/CCST.2019.8888434
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record