SlideShare a Scribd company logo
1 of 3
Download to read offline
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011



   Real Time Speaker Identification System – Design,
            Implementation and Validation
                                                       Dr. M. Meenakshi
                         Professor, Dept. of Instrumentation Technology, Dr. AIT Bangalore 560056
                                           Email: meenakshi_mbhat@yahoo.com


Abstract— This paper presents design, implementation and                probability outcome from a sequence of samples. The cepstral
validation of a PC based Prototype speaker recognition and              analysis supplanted the direct use of linear prediction analysis
verification system. This system is organized to receive speech         LP, derived from the hidden Markov modeling.
signal, find the features of speech signal, and recognize and                A speaker recognition system often works in either of
verify a person using voice as the biometric. The system is             two operating modes i.e., Text-dependent, where the same
implemented to capture the speech signal from microphone                or known text is used for training and test and text-
and to compare it with the stored data base using filter-bank
                                                                        independent. This paper covers the detailed study of
based closed-set speaker verification system. At first, the
identification of the voice signals is done using an algorithm
                                                                        MATLAB simulation of the filter-bank based closed-set
developed in MATLAB. Next, a PC based prototype system is               speaker verification system. It involves the study of filters
developed and is validated in real time. Several tests were made        namely the FIR and IIR filter design and the study of
on different sets of voice signals, and measured the performance        efficiency of the filter-bank based speaker verification
and the speed of the proposed system in real environment. The           system. Here, algorithm for “text-dependent Speaker
result confirmed the use of proposed system for various real            Verification”, which may be employed in security systems,
time applications.                                                      is developed. Finally a real time PC based prototype system
                                                                        for automatic opening/closing of the door is developed and
Keywords— Biometrics, voice recognition, feature extraction,
                                                                        validated.
finger print, MATLAB, auto correlation, Euclidean distance.
                                                                          This research is carried out under two headings i.e. training
                                                                        and recognition. In the training phase” fingerprints” of the
                    I INTRODUCTION
                                                                        voice signal are extracted and stored in database.
    Speech recognition has been an active field of research             “Fingerprint”, which is a vector of numbers, represents
during the last three decades. Speaker Recognition is a                 characteristics of the sound in the frequency domain as time
process of automatically recognizing who is speaking on the             evolves. Each number represents the energy, or average
basis of speaker dependent features of the speech signal.               power that was heard in a particular frequency band, during
Basically, speaker recognition is classified in to speaker              a particular interval of time. In the recognition phase, the
identification and speaker verification. Wide application of            fingerprint of the immediate voice input is compared with
speaker recognition system includes control access to                   finger-prints stored in the database. Here the efficiency and
services such as banking by telephone, database access                  drawbacks of two comparison processes namely: Euclidean
services, voice dialing telephone shopping so on. Now,                  distance and Auto Correlation Co-efficient methods are
speaker recognition technology is the most suitable                     examined.
technology to create new services that will make our every                  The organization of this paper is as follows: Section II
day lives more secured.                                                 highlights the principles of the proposed speaker
   Biometrics is seen by many researchers as a solution to a            identification system. Implementation methodology of the
lot of user identification and security problems [1]. This may          proposed system is given in section III. Next, section IV
include speaker identification, face recognition, fingerprint           highlights the results and analysis of the developed system.
recognition, finger geometry, hand geometry, iris recognition,          Real time validation of the PC based, speaker identification
vein recognition, and voice and signature recognition.                  system is also presented in section IV. Finally conclusions
Various techniques are available in literature to resolve the           are drawn in section V.
automatic speaker identification problem [2 - 3]. Generally,
speech signal is mixed up with noise signal. However, most                  II PRINCIPLES OF THE PROPOSED SPEAKER
of the work on speech processing for the speaker recognition                         IDENTIFICATION SYSTEM
was done by focusing the speech under the noiseless
environments and only few by focusing speech under noisy                   Voice recognition refers to the process of identification
conditions [4-5].                                                       of a person’s identity with voice as the biometric. The
  Researchers in [6 -8] are used algorithms based on Cepstral           objective of speaker identification system is labeling an
analysis or homomorphic analysis for automated speech                   unknown voice as one of a set of known voices. Architecture
recognition. Most frequently used method is the statistical             of the speaker identification system depends on the choice
hidden Markov model (HMM) as in [9-10] which use                        of recognition situation. Probabilistic approach is most
libraries of words and grammar rules to select the highest              suitable in the case of text independent situations whereas a

© 2011 ACEEE                                                       39
DOI: 01.IJCSI.02.01.82
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011


time alignment, the dynamic time warping (DTW) of the                   A. Front-end processing: This refers to training phase and is
utterance with the test can be enough for text dependent cases.         used to highlight the relevant features and remove the
          The focus of this work ison the identification of a           irrelevant ones. This phase is accomplished using the filter-
speaker from a group of N known speakers, in a text inde-               bank based method of implementation and tested with both
pendent situation. Speaker Verification is the process of de-           FIR and IIR filters.
termining whether the speaker identity is who the person                B. Speaker Modeling: This phase mainly involves storing of
claims to be. One among the various approaches to speech                relevant features extracted in the Front-end processing step.
recognition is the pattern recognition approach, which has              C. Pattern Matching: This basically involves matching or
two steps, namely, training of speech patterns, and recogni-            comparison of the stored speaker model with the input
tion of patterns via pattern comparison. The concept is that            speaker model (voice from unknown speaker) .Here,
if enough versions of a pattern to be recognized are included           Euclidean Distance and Auto Correlation Coefficient
in the training set provided to the algorithm, the training             methods are used for the comparison.
procedure should be able to adequately characterize the
acoustic properties of the pattern. This type of characteriza-                               III. METODHOLOGY
tion of speech via training is called as pattern classification.
                                                                                  The MATLAB simulation of the speaker
Here the machine learns, which acoustic properties of the
                                                                        verification system based on filter-bank method involves the
speech class are reliable and repeatable across all training
                                                                        following steps:
tokens of the pattern. The utility of this method is the pat-
                                                                        1. Training Phase that includes: (A) Speech Spectrum
tern comparison stage with each possible pattern learned in
                                                                        Analysis, (B) Decimation and FFT, Band-Pass filtering and
the training phase and classifying the speech according to
                                                                        (C) fingerprint accumulation
the accuracy of the match of the patterns. The basic struc-
                                                                        2. Recognition Phase including: (A) Comparison and (B)
ture of speaker verification system, which uses the above
                                                                        Decision making
said approach is shown in Fig. 1 and has three main compo-
                                                                            The speech input is read into MATLAB at sampling
nents, i.e, Front-end processing, Speaker modeling and Pat-
                                                                        frequency of 8 KHz since human speech spectrum lies
tern Matching.




                                         Figure 1. Basic Structure of Speaker Verification System

under 4 KHz. Signal, which is read in at 8000samples/second
is reduced to 4000samples/second by decimation of input
signal by a factor of 2. The decimated signal is then
interpolated by the same factor to validate the decimation
process as in Figure. 2. Once the decimation is completed,
the FFT of signal is obtained to get the frequency domain
values of the speech signal.
   In the next step, i.e., bands pass filtering and finger print
accumulation, the method employed is termed as “sub-band
filter bank” coding, in which the speech signal is first split
into frequency bands using a bank of band-pass filters.
The filter bank is a collection of band-pass filters all                        Figure 2. Decimation and interpolation of speech signal
processing the same input signal. Here, three different
frequency bands are selected namely: 50-500Hz, 500-
1000Hz and 1000-1500Hz. Also, the band pass filtering is
tested with the IIR and FIR filters and the performance of
these two implementations is gauged. Figs. 3 and 4 gives
the outputs of FIR and IIR filters for the frequency of 0-
500Hz with, the sampling frequency of 2 kHz.



                                                                                        Figure 3. FIR filtering of speech signal


© 2011 ACEEE                                                       40
DOI: 01.IJCSI.02.01.82
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011

Next, the output of the bandpass filters is accumulated to                        From the Fig. 4, it is clear that auto correlation co-
form the finger print of the voice signal, which is obtained            efficient for person 3 is 1 and the other users are very low.
by the summation of the square of the bandpass filter outputs.          Hence user 3 is selected by the system. Results demonstrate
                                                                        that the probability of matching with a mimic signal was
                                                                        considerably reduced. It gave an accuracy of more than
                                                                        85%. The recognition accuracy was high even if there were
                                                                        slight variations. Thus, it proves to be a better method of
                                                                        recognitions than Euclidean distance method.
                                                                           Finally, several real time voice signals are inputted to the
                                                                        PC Based Speaker Identification/ Recognition System and
                                                                        validated the above mentioned results. A prototype speaker
                                                                        identification system is developed to open or close the door
                                                                        automatically by receiving the known voice signal and
                                                                        validated in real time.

                                                                                              IV. CONCLUSION
                 Figure 4. IIR filtering of speech signal
         The next step is comparison and is done by using                         This paper explained the development of simulated
Euclidean distance method and Auto Correlation Coefficient              speaker verification system for the speaker identification
method. Minimum Euclidean distance indicates a closer                   application. Recognition is performed by Filter-bank based
match between the two signals compared. Similarly, auto                 method. Filter banks are designed to reduce the noise and to
Correlation of +1 indicates maximum match and a –ve value               extract essential features of speech signal. Higher the number
or a value close to 0.0 indicates no match.                             of bands selected, higher the accuracy obtained. Finally the
                                                                        proposed algorithm is validated in real time PC based,
              IV. RESULTS AND ANALYSIS                                  prototype speaker identification system. It is proved that,
                                                                        the proposed system is suitable for different real time
         Figs 5 and 6 give the graphical representation of              applications.
the simulated results of the comparison using Euclidean
distance and Auto correlation coefficient methods                                                 REFERENCES
respectively.
                                                                        [1] A. Jain, R. Bole, S. Pankanti, “Biometrics Personal
                                                                        Identification in Networked Society”, Kluwer Academic Press,
                                                                        Boston, 1999.
                                                                        [2] Jain, A., R.P.W.Duin, and J.Mao., “Statistical pattern
                                                                        recognition: a review”, IEEE Trans. on Pattern Analysis and
                                                                        Machine Intelligence 22, pp. 4–37, 2000
                                                                         [3] Sadaoki Furui, “50 Years of Progress in Speech and Speaker
                                                                        Recognition Research”, ECTI transactions on computer and
                                                                        information technology, Vol.1, No.2, 2005.
                                                                         [4] Zoubir Hamici, “Speaker Recognition Using Spectral Cross-
                                                                        correlation: A Fast Algorithm”, Journal of Computer Science
                                                                        (Special Issue): pp. 84-88, 2005
                                                                        [5]Wu, D., Morris, A.C.&Koreman, J.,”MLP Internal
                                                                        Representation as Disciminant Features for Improved Speaker
                                                                        Recognition”, in Proc. NOLISP2005, Barcelona, Spain, pp. 25-
                                                                        33, 2005.
                                                                        [6] A. Mesaros, and J. Astola, “The mel-frequency cepstral
                                                                        coefficients in the context of singer identification,” in Proc. of
                                                                        ISMIR 2005, London, UK, pp.11-15, September 2005.
                                                                        [7] Donato Impedovo, Mario Refice, “Optimizing Features
Fig 6 indicates minimum Euclidean distance to person 3                  Extraction Parameters for Speaker Verification” 12th WSEAS
hence, selected user is person 3. Also, note that the Euclid-           International Conference on SYSTEMS, Heraklion, Greece, pp
ean distance of other users are very close to that of person 3.         498 -503, July 22-24, 2008
                                                                        [8] D. Impedovo, M. Refice, “The Influence of Frame Length on
Hence, when there are slight variations in the users voice
                                                                        Speaker Identification Performance”, Proceedings of IAS 2007,
input, the Euclidean distance changes due to which the sys-             Manchester, 2007.
tem fails to recognize the correct user. Also, when the user’s           [9] C.Y. Espy-Wilson, S.Manocha, S.Vishnubhotla,, “A new set
voice is imitated by others, the comparison gives wrong iden-           of features for text-independent, speaker identification”,
tification. Therefore the accuracy achievable using Euclid-             Proceedings of ICSLP, 2006, pp.1475-1478, 2006.
ean distance is reduced to 65-70%. Hence, it is concluded               [10]. Povlow, B. and S. Dunn,. “Texture classification using
that Euclidean distance method of comparison is not the best            noncausal hidden markov models”, IEEE Trans. Pattern Analysis
ways for comparison.                                                    and Machine Intelligence, 17: pp. 1010 -1014., 1995.

© 2011 ACEEE                                                       41
DOI: 01.IJCSI.02.01.82

More Related Content

What's hot

A Survey on Speaker Recognition System
A Survey on Speaker Recognition SystemA Survey on Speaker Recognition System
A Survey on Speaker Recognition System
Vani011
 
Environmental Sound detection Using MFCC technique
Environmental Sound detection Using MFCC techniqueEnvironmental Sound detection Using MFCC technique
Environmental Sound detection Using MFCC technique
Pankaj Kumar
 
DEVELOPMENT OF SPEAKER VERIFICATION UNDER LIMITED DATA AND CONDITION
DEVELOPMENT OF SPEAKER VERIFICATION  UNDER LIMITED DATA AND CONDITIONDEVELOPMENT OF SPEAKER VERIFICATION  UNDER LIMITED DATA AND CONDITION
DEVELOPMENT OF SPEAKER VERIFICATION UNDER LIMITED DATA AND CONDITION
niranjan kumar
 
Speaker recognition using MFCC
Speaker recognition using MFCCSpeaker recognition using MFCC
Speaker recognition using MFCC
Hira Shaukat
 
Classification of Language Speech Recognition System
Classification of Language Speech Recognition SystemClassification of Language Speech Recognition System
Classification of Language Speech Recognition System
ijtsrd
 

What's hot (20)

A Survey on Speaker Recognition System
A Survey on Speaker Recognition SystemA Survey on Speaker Recognition System
A Survey on Speaker Recognition System
 
Environmental Sound detection Using MFCC technique
Environmental Sound detection Using MFCC techniqueEnvironmental Sound detection Using MFCC technique
Environmental Sound detection Using MFCC technique
 
52 57
52 5752 57
52 57
 
DEVELOPMENT OF SPEAKER VERIFICATION UNDER LIMITED DATA AND CONDITION
DEVELOPMENT OF SPEAKER VERIFICATION  UNDER LIMITED DATA AND CONDITIONDEVELOPMENT OF SPEAKER VERIFICATION  UNDER LIMITED DATA AND CONDITION
DEVELOPMENT OF SPEAKER VERIFICATION UNDER LIMITED DATA AND CONDITION
 
Speech Signal Analysis
Speech Signal AnalysisSpeech Signal Analysis
Speech Signal Analysis
 
COLEA : A MATLAB Tool for Speech Analysis
COLEA : A MATLAB Tool for Speech AnalysisCOLEA : A MATLAB Tool for Speech Analysis
COLEA : A MATLAB Tool for Speech Analysis
 
Deep Learning - Speaker Verification, Sound Event Detection
Deep Learning - Speaker Verification, Sound Event DetectionDeep Learning - Speaker Verification, Sound Event Detection
Deep Learning - Speaker Verification, Sound Event Detection
 
Speaker recognition using MFCC
Speaker recognition using MFCCSpeaker recognition using MFCC
Speaker recognition using MFCC
 
Deep Learning in practice : Speech recognition and beyond - Meetup
Deep Learning in practice : Speech recognition and beyond - MeetupDeep Learning in practice : Speech recognition and beyond - Meetup
Deep Learning in practice : Speech recognition and beyond - Meetup
 
Automatic speech recognition system using deep learning
Automatic speech recognition system using deep learningAutomatic speech recognition system using deep learning
Automatic speech recognition system using deep learning
 
[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P
[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P
[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P
 
Speaker recognition on matlab
Speaker recognition on matlabSpeaker recognition on matlab
Speaker recognition on matlab
 
Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...
Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...
Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...
 
Speaker Identification & Verification Using MFCC & SVM
Speaker Identification & Verification Using MFCC & SVMSpeaker Identification & Verification Using MFCC & SVM
Speaker Identification & Verification Using MFCC & SVM
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
 
Utterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANNUtterance Based Speaker Identification Using ANN
Utterance Based Speaker Identification Using ANN
 
IRJET - Audio Emotion Analysis
IRJET - Audio Emotion AnalysisIRJET - Audio Emotion Analysis
IRJET - Audio Emotion Analysis
 
Voice Identification And Recognition System, Matlab
Voice Identification And Recognition System, MatlabVoice Identification And Recognition System, Matlab
Voice Identification And Recognition System, Matlab
 
Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...
Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...
Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...
 
Classification of Language Speech Recognition System
Classification of Language Speech Recognition SystemClassification of Language Speech Recognition System
Classification of Language Speech Recognition System
 

Viewers also liked

Preemptive Job Scheduling with Priorities and Starvation Avoidance CUM Throug...
Preemptive Job Scheduling with Priorities and Starvation Avoidance CUM Throug...Preemptive Job Scheduling with Priorities and Starvation Avoidance CUM Throug...
Preemptive Job Scheduling with Priorities and Starvation Avoidance CUM Throug...
IDES Editor
 
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...
IDES Editor
 
Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...
Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...
Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...
IDES Editor
 

Viewers also liked (19)

Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
 
Simultaneous Generation Expansion Planning and Natural Gas Expansion Planning
Simultaneous Generation Expansion Planning and Natural Gas Expansion PlanningSimultaneous Generation Expansion Planning and Natural Gas Expansion Planning
Simultaneous Generation Expansion Planning and Natural Gas Expansion Planning
 
Preemptive Job Scheduling with Priorities and Starvation Avoidance CUM Throug...
Preemptive Job Scheduling with Priorities and Starvation Avoidance CUM Throug...Preemptive Job Scheduling with Priorities and Starvation Avoidance CUM Throug...
Preemptive Job Scheduling with Priorities and Starvation Avoidance CUM Throug...
 
On Data Mining in Inverse Scattering Problems: Neural Networks Applied to GPR...
On Data Mining in Inverse Scattering Problems: Neural Networks Applied to GPR...On Data Mining in Inverse Scattering Problems: Neural Networks Applied to GPR...
On Data Mining in Inverse Scattering Problems: Neural Networks Applied to GPR...
 
Automated Colorization of Grayscale Images Using Texture Descriptors
Automated Colorization of Grayscale Images Using Texture DescriptorsAutomated Colorization of Grayscale Images Using Texture Descriptors
Automated Colorization of Grayscale Images Using Texture Descriptors
 
Secure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterSecure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan Register
 
Design and Performance Evaluation of an Efficient Home Agent Reliability Prot...
Design and Performance Evaluation of an Efficient Home Agent Reliability Prot...Design and Performance Evaluation of an Efficient Home Agent Reliability Prot...
Design and Performance Evaluation of an Efficient Home Agent Reliability Prot...
 
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...
 
A Novel Approach to Digital Gate Design
A Novel Approach to Digital Gate DesignA Novel Approach to Digital Gate Design
A Novel Approach to Digital Gate Design
 
Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...
 
AM-RF partially overlapped channels separation by Volterra integral equations
AM-RF partially overlapped channels separation by Volterra integral equationsAM-RF partially overlapped channels separation by Volterra integral equations
AM-RF partially overlapped channels separation by Volterra integral equations
 
A HVS based Perceptual Quality Estimation Measure for Color Images
A HVS based Perceptual Quality Estimation Measure for Color ImagesA HVS based Perceptual Quality Estimation Measure for Color Images
A HVS based Perceptual Quality Estimation Measure for Color Images
 
Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...
Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...
Interoperability of Reconfiguring System on FPGA Using a Design Entry of Hard...
 
Capacity Evaluation of a High Altitude Platform Diversity System Equipped wit...
Capacity Evaluation of a High Altitude Platform Diversity System Equipped wit...Capacity Evaluation of a High Altitude Platform Diversity System Equipped wit...
Capacity Evaluation of a High Altitude Platform Diversity System Equipped wit...
 
Object Detection and tracking in Video Sequences
Object Detection and tracking in Video SequencesObject Detection and tracking in Video Sequences
Object Detection and tracking in Video Sequences
 
Detection of suspected nodes in MANET
Detection of suspected nodes in MANETDetection of suspected nodes in MANET
Detection of suspected nodes in MANET
 
Development of Switch Mode Dc Converter Using MATLAB/ dSPACE
Development of Switch Mode Dc Converter Using MATLAB/ dSPACEDevelopment of Switch Mode Dc Converter Using MATLAB/ dSPACE
Development of Switch Mode Dc Converter Using MATLAB/ dSPACE
 
Enhancing Privacy of Confidential Data using K Anonymization
Enhancing Privacy of Confidential Data using K AnonymizationEnhancing Privacy of Confidential Data using K Anonymization
Enhancing Privacy of Confidential Data using K Anonymization
 
Space Vector Pulse Width Modulation Schemes for Two-Level Voltage Source Inve...
Space Vector Pulse Width Modulation Schemes for Two-Level Voltage Source Inve...Space Vector Pulse Width Modulation Schemes for Two-Level Voltage Source Inve...
Space Vector Pulse Width Modulation Schemes for Two-Level Voltage Source Inve...
 

Similar to Real Time Speaker Identification System – Design, Implementation and Validation

Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
Anshuli Mittal
 
Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...
IOSR Journals
 
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
AIRCC Publishing Corporation
 

Similar to Real Time Speaker Identification System – Design, Implementation and Validation (20)

Automatic Speaker Recognition and AI.pdf
Automatic Speaker Recognition and AI.pdfAutomatic Speaker Recognition and AI.pdf
Automatic Speaker Recognition and AI.pdf
 
An overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdfAn overview of speaker recognition by Bhusan Chettri.pdf
An overview of speaker recognition by Bhusan Chettri.pdf
 
Using AI to recognise person
Using AI to recognise personUsing AI to recognise person
Using AI to recognise person
 
A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...A comparison of different support vector machine kernels for artificial speec...
A comparison of different support vector machine kernels for artificial speec...
 
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition TechniqueA Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
 
Utterance based speaker identification
Utterance based speaker identificationUtterance based speaker identification
Utterance based speaker identification
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
AN EFFICIENT SPEECH RECOGNITION SYSTEM
AN EFFICIENT SPEECH RECOGNITION SYSTEMAN EFFICIENT SPEECH RECOGNITION SYSTEM
AN EFFICIENT SPEECH RECOGNITION SYSTEM
 
Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...
 
Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...
 
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
 
H42045359
H42045359H42045359
H42045359
 
A Review On Speech Feature Techniques And Classification Techniques
A Review On Speech Feature Techniques And Classification TechniquesA Review On Speech Feature Techniques And Classification Techniques
A Review On Speech Feature Techniques And Classification Techniques
 
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
 
Speaker Recognition Using Vocal Tract Features
Speaker Recognition Using Vocal Tract FeaturesSpeaker Recognition Using Vocal Tract Features
Speaker Recognition Using Vocal Tract Features
 
50120140502007
5012014050200750120140502007
50120140502007
 
Course report-islam-taharimul (1)
Course report-islam-taharimul (1)Course report-islam-taharimul (1)
Course report-islam-taharimul (1)
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
19 ijcse-01227
19 ijcse-0122719 ijcse-01227
19 ijcse-01227
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

More from IDES Editor

Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Real Time Speaker Identification System – Design, Implementation and Validation

  • 1. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 Real Time Speaker Identification System – Design, Implementation and Validation Dr. M. Meenakshi Professor, Dept. of Instrumentation Technology, Dr. AIT Bangalore 560056 Email: meenakshi_mbhat@yahoo.com Abstract— This paper presents design, implementation and probability outcome from a sequence of samples. The cepstral validation of a PC based Prototype speaker recognition and analysis supplanted the direct use of linear prediction analysis verification system. This system is organized to receive speech LP, derived from the hidden Markov modeling. signal, find the features of speech signal, and recognize and A speaker recognition system often works in either of verify a person using voice as the biometric. The system is two operating modes i.e., Text-dependent, where the same implemented to capture the speech signal from microphone or known text is used for training and test and text- and to compare it with the stored data base using filter-bank independent. This paper covers the detailed study of based closed-set speaker verification system. At first, the identification of the voice signals is done using an algorithm MATLAB simulation of the filter-bank based closed-set developed in MATLAB. Next, a PC based prototype system is speaker verification system. It involves the study of filters developed and is validated in real time. Several tests were made namely the FIR and IIR filter design and the study of on different sets of voice signals, and measured the performance efficiency of the filter-bank based speaker verification and the speed of the proposed system in real environment. The system. Here, algorithm for “text-dependent Speaker result confirmed the use of proposed system for various real Verification”, which may be employed in security systems, time applications. is developed. Finally a real time PC based prototype system for automatic opening/closing of the door is developed and Keywords— Biometrics, voice recognition, feature extraction, validated. finger print, MATLAB, auto correlation, Euclidean distance. This research is carried out under two headings i.e. training and recognition. In the training phase” fingerprints” of the I INTRODUCTION voice signal are extracted and stored in database. Speech recognition has been an active field of research “Fingerprint”, which is a vector of numbers, represents during the last three decades. Speaker Recognition is a characteristics of the sound in the frequency domain as time process of automatically recognizing who is speaking on the evolves. Each number represents the energy, or average basis of speaker dependent features of the speech signal. power that was heard in a particular frequency band, during Basically, speaker recognition is classified in to speaker a particular interval of time. In the recognition phase, the identification and speaker verification. Wide application of fingerprint of the immediate voice input is compared with speaker recognition system includes control access to finger-prints stored in the database. Here the efficiency and services such as banking by telephone, database access drawbacks of two comparison processes namely: Euclidean services, voice dialing telephone shopping so on. Now, distance and Auto Correlation Co-efficient methods are speaker recognition technology is the most suitable examined. technology to create new services that will make our every The organization of this paper is as follows: Section II day lives more secured. highlights the principles of the proposed speaker Biometrics is seen by many researchers as a solution to a identification system. Implementation methodology of the lot of user identification and security problems [1]. This may proposed system is given in section III. Next, section IV include speaker identification, face recognition, fingerprint highlights the results and analysis of the developed system. recognition, finger geometry, hand geometry, iris recognition, Real time validation of the PC based, speaker identification vein recognition, and voice and signature recognition. system is also presented in section IV. Finally conclusions Various techniques are available in literature to resolve the are drawn in section V. automatic speaker identification problem [2 - 3]. Generally, speech signal is mixed up with noise signal. However, most II PRINCIPLES OF THE PROPOSED SPEAKER of the work on speech processing for the speaker recognition IDENTIFICATION SYSTEM was done by focusing the speech under the noiseless environments and only few by focusing speech under noisy Voice recognition refers to the process of identification conditions [4-5]. of a person’s identity with voice as the biometric. The Researchers in [6 -8] are used algorithms based on Cepstral objective of speaker identification system is labeling an analysis or homomorphic analysis for automated speech unknown voice as one of a set of known voices. Architecture recognition. Most frequently used method is the statistical of the speaker identification system depends on the choice hidden Markov model (HMM) as in [9-10] which use of recognition situation. Probabilistic approach is most libraries of words and grammar rules to select the highest suitable in the case of text independent situations whereas a © 2011 ACEEE 39 DOI: 01.IJCSI.02.01.82
  • 2. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 time alignment, the dynamic time warping (DTW) of the A. Front-end processing: This refers to training phase and is utterance with the test can be enough for text dependent cases. used to highlight the relevant features and remove the The focus of this work ison the identification of a irrelevant ones. This phase is accomplished using the filter- speaker from a group of N known speakers, in a text inde- bank based method of implementation and tested with both pendent situation. Speaker Verification is the process of de- FIR and IIR filters. termining whether the speaker identity is who the person B. Speaker Modeling: This phase mainly involves storing of claims to be. One among the various approaches to speech relevant features extracted in the Front-end processing step. recognition is the pattern recognition approach, which has C. Pattern Matching: This basically involves matching or two steps, namely, training of speech patterns, and recogni- comparison of the stored speaker model with the input tion of patterns via pattern comparison. The concept is that speaker model (voice from unknown speaker) .Here, if enough versions of a pattern to be recognized are included Euclidean Distance and Auto Correlation Coefficient in the training set provided to the algorithm, the training methods are used for the comparison. procedure should be able to adequately characterize the acoustic properties of the pattern. This type of characteriza- III. METODHOLOGY tion of speech via training is called as pattern classification. The MATLAB simulation of the speaker Here the machine learns, which acoustic properties of the verification system based on filter-bank method involves the speech class are reliable and repeatable across all training following steps: tokens of the pattern. The utility of this method is the pat- 1. Training Phase that includes: (A) Speech Spectrum tern comparison stage with each possible pattern learned in Analysis, (B) Decimation and FFT, Band-Pass filtering and the training phase and classifying the speech according to (C) fingerprint accumulation the accuracy of the match of the patterns. The basic struc- 2. Recognition Phase including: (A) Comparison and (B) ture of speaker verification system, which uses the above Decision making said approach is shown in Fig. 1 and has three main compo- The speech input is read into MATLAB at sampling nents, i.e, Front-end processing, Speaker modeling and Pat- frequency of 8 KHz since human speech spectrum lies tern Matching. Figure 1. Basic Structure of Speaker Verification System under 4 KHz. Signal, which is read in at 8000samples/second is reduced to 4000samples/second by decimation of input signal by a factor of 2. The decimated signal is then interpolated by the same factor to validate the decimation process as in Figure. 2. Once the decimation is completed, the FFT of signal is obtained to get the frequency domain values of the speech signal. In the next step, i.e., bands pass filtering and finger print accumulation, the method employed is termed as “sub-band filter bank” coding, in which the speech signal is first split into frequency bands using a bank of band-pass filters. The filter bank is a collection of band-pass filters all Figure 2. Decimation and interpolation of speech signal processing the same input signal. Here, three different frequency bands are selected namely: 50-500Hz, 500- 1000Hz and 1000-1500Hz. Also, the band pass filtering is tested with the IIR and FIR filters and the performance of these two implementations is gauged. Figs. 3 and 4 gives the outputs of FIR and IIR filters for the frequency of 0- 500Hz with, the sampling frequency of 2 kHz. Figure 3. FIR filtering of speech signal © 2011 ACEEE 40 DOI: 01.IJCSI.02.01.82
  • 3. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 Next, the output of the bandpass filters is accumulated to From the Fig. 4, it is clear that auto correlation co- form the finger print of the voice signal, which is obtained efficient for person 3 is 1 and the other users are very low. by the summation of the square of the bandpass filter outputs. Hence user 3 is selected by the system. Results demonstrate that the probability of matching with a mimic signal was considerably reduced. It gave an accuracy of more than 85%. The recognition accuracy was high even if there were slight variations. Thus, it proves to be a better method of recognitions than Euclidean distance method. Finally, several real time voice signals are inputted to the PC Based Speaker Identification/ Recognition System and validated the above mentioned results. A prototype speaker identification system is developed to open or close the door automatically by receiving the known voice signal and validated in real time. IV. CONCLUSION Figure 4. IIR filtering of speech signal The next step is comparison and is done by using This paper explained the development of simulated Euclidean distance method and Auto Correlation Coefficient speaker verification system for the speaker identification method. Minimum Euclidean distance indicates a closer application. Recognition is performed by Filter-bank based match between the two signals compared. Similarly, auto method. Filter banks are designed to reduce the noise and to Correlation of +1 indicates maximum match and a –ve value extract essential features of speech signal. Higher the number or a value close to 0.0 indicates no match. of bands selected, higher the accuracy obtained. Finally the proposed algorithm is validated in real time PC based, IV. RESULTS AND ANALYSIS prototype speaker identification system. It is proved that, the proposed system is suitable for different real time Figs 5 and 6 give the graphical representation of applications. the simulated results of the comparison using Euclidean distance and Auto correlation coefficient methods REFERENCES respectively. [1] A. Jain, R. Bole, S. Pankanti, “Biometrics Personal Identification in Networked Society”, Kluwer Academic Press, Boston, 1999. [2] Jain, A., R.P.W.Duin, and J.Mao., “Statistical pattern recognition: a review”, IEEE Trans. on Pattern Analysis and Machine Intelligence 22, pp. 4–37, 2000 [3] Sadaoki Furui, “50 Years of Progress in Speech and Speaker Recognition Research”, ECTI transactions on computer and information technology, Vol.1, No.2, 2005. [4] Zoubir Hamici, “Speaker Recognition Using Spectral Cross- correlation: A Fast Algorithm”, Journal of Computer Science (Special Issue): pp. 84-88, 2005 [5]Wu, D., Morris, A.C.&Koreman, J.,”MLP Internal Representation as Disciminant Features for Improved Speaker Recognition”, in Proc. NOLISP2005, Barcelona, Spain, pp. 25- 33, 2005. [6] A. Mesaros, and J. Astola, “The mel-frequency cepstral coefficients in the context of singer identification,” in Proc. of ISMIR 2005, London, UK, pp.11-15, September 2005. [7] Donato Impedovo, Mario Refice, “Optimizing Features Fig 6 indicates minimum Euclidean distance to person 3 Extraction Parameters for Speaker Verification” 12th WSEAS hence, selected user is person 3. Also, note that the Euclid- International Conference on SYSTEMS, Heraklion, Greece, pp ean distance of other users are very close to that of person 3. 498 -503, July 22-24, 2008 [8] D. Impedovo, M. Refice, “The Influence of Frame Length on Hence, when there are slight variations in the users voice Speaker Identification Performance”, Proceedings of IAS 2007, input, the Euclidean distance changes due to which the sys- Manchester, 2007. tem fails to recognize the correct user. Also, when the user’s [9] C.Y. Espy-Wilson, S.Manocha, S.Vishnubhotla,, “A new set voice is imitated by others, the comparison gives wrong iden- of features for text-independent, speaker identification”, tification. Therefore the accuracy achievable using Euclid- Proceedings of ICSLP, 2006, pp.1475-1478, 2006. ean distance is reduced to 65-70%. Hence, it is concluded [10]. Povlow, B. and S. Dunn,. “Texture classification using that Euclidean distance method of comparison is not the best noncausal hidden markov models”, IEEE Trans. Pattern Analysis ways for comparison. and Machine Intelligence, 17: pp. 1010 -1014., 1995. © 2011 ACEEE 41 DOI: 01.IJCSI.02.01.82