dc.contributor.author | Hertlein, Heinz | |
dc.contributor.author | Ariyaeeinia, Aladdin | |
dc.contributor.author | Jeffrey, Zoe | |
dc.contributor.author | Ramalingam, Soodamani | |
dc.date.accessioned | 2019-11-13T01:04:52Z | |
dc.date.available | 2019-11-13T01:04:52Z | |
dc.date.issued | 2019-10-31 | |
dc.identifier.citation | Hertlein , H , Ariyaeeinia , A , Jeffrey , Z & Ramalingam , S 2019 , Effectiveness in the Realisation of Speaker Authentication . in 2019 International Carnahan Conference on Security Technology (ICCST), CHENNAI, India, 2019 : IEEE ICCST 2019 . , 8888434 , Proceedings - International Carnahan Conference on Security Technology , vol. 2019-October , Institute of Electrical and Electronics Engineers (IEEE) , pp. 1-5 , The IEEE (53rd) International Carnahan Conference on Security Technology , Chennai , India , 1/10/19 . https://doi.org/10.1109/CCST.2019.8888434 | |
dc.identifier.citation | conference | |
dc.identifier.isbn | 978-1-7281-1575-7 | |
dc.identifier.isbn | 9781728115764 | |
dc.identifier.issn | 1071-6572 | |
dc.identifier.uri | http://hdl.handle.net/2299/21884 | |
dc.description | © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
dc.description.abstract | An important consideration for the deployment of speaker recognition in authentication applications is the approach to the formation of training and testing utterances . Whilst defining this for a specific scenario is influenced by the associated requirements and conditions, the process can be further guided through the establishment of the relative usefulness of alternative frameworks for composing the training and testing material. In this regard, the present paper provides an analysis of the effects, on the speaker recognition accuracy, of various bases for the formation of the training and testing data. The experimental investigations are conducted based on the use of digit utterances taken from the XM2VTS database. The paper presents a detailed description of the individual approaches considered and discusses the experimental results obtained in different cases. | en |
dc.format.extent | 5 | |
dc.format.extent | 328347 | |
dc.language.iso | eng | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.relation.ispartof | 2019 International Carnahan Conference on Security Technology (ICCST), CHENNAI, India, 2019 | |
dc.relation.ispartofseries | Proceedings - International Carnahan Conference on Security Technology | |
dc.subject | Biometric Applications | |
dc.subject | Speaker Authentication | |
dc.subject | Speaker Recognition | |
dc.subject | Electrical and Electronic Engineering | |
dc.subject | Law | |
dc.title | Effectiveness in the Realisation of Speaker Authentication | en |
dc.contributor.institution | Centre for Engineering Research | |
dc.contributor.institution | Communications and Intelligent Systems | |
dc.contributor.institution | Smart Mobility Unit | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.contributor.institution | Department of Engineering and Technology | |
dc.contributor.institution | School of Engineering and Technology | |
dc.identifier.url | http://www.scopus.com/inward/record.url?scp=85074968415&partnerID=8YFLogxK | |
rioxxterms.versionofrecord | 10.1109/CCST.2019.8888434 | |
rioxxterms.type | Other | |
herts.preservation.rarelyaccessed | true | |