SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2290
ANALYSIS OF SUITABLE EXTRACTION METHODS AND CLASSIFIERS FOR
SPEAKER IDENTIFICATION
R.ARUL JOTHI M.E
Applied Electronics, Dept. of ECE,
Anna University Regional Campus, Tirunelveli
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - SpeakerIdentificationsystemplaysan important
role in the identification of human voice and disguised voices
especially in the cases of telephoned bomb threat and demand
of money in kidnapping cases etc. A suitablefeatureextraction
technique which captures the unique characteristics of voice
signal can be used to identify criminals. Here Purposed Mel
Frequency Cepstrum Coefficient (MFCC) feature extraction
method is used; Mel FrequencyCepstrumCoefficientcanfollow
the frequency spectral properties.. Thenanalgorithmbased on
the extracted features are investigated with the Machine
Learning techniques such as SVM(Support Vector
Machine)Classifier is purposed to classifies the human voice
and disguised voices. The experimental result indicates the
proposed system, compared with MFCC with SVM classifier
improves the performances of Speaker Identification system
and accuracy rates up to 90%.
Key Words: Mel Frequency Cepstral Coefficient (MFCC),
Support Vector Machine (SVM), Linear Predictive Cepstral
Coefficient (LPCC), Fast Fourier Transform (FFT), Discrete
Cosine Transform (DCT).
1. INTRODUCTION
Speaker Identification system requires two
recording voice samples i.e., an original voice of suspected
person and a disguised or unknown voice sample. The
disguised or unknown voice sample that can be recorded
from the cellular phone calls, telephone calls or tape-
recorder recording samples is usually taken from the police
department.
The speech recording system of Andrey Baranov et
al (2010) proposed system which, consists of several
parameters to improvetherecordingspeechsamplethey are
overloading, reverberationandcompressionetc.Thesorting
of signal amplitude limitation is done by overloading, it
occurs due to the dynamic range of recording chain sample
which cannot match with the dynamic range of unknown
recording voice signal. It causes the negative acceptance of
frequency in the phonetic quality of voice signal.
Next lets to study about the voicedisguisinginvoice
forensic system, that is the process bywhichanutterervoice
tone gets changed and helps in hiding his/her individuality.
Voice disguise has two types they are Intentional voice and
Unintentional voice. Intentional voice can also classify into
two types they are Electronic disguise voice and Non
Electronic disguisevoice.Electronicdisguisedvoiceobtained
by using electronic scrambling devices to modify frequency
spectral properties such as the voice pitch and voice
formants of an original voice. The original voice has been
changed by using some software’s such as AV Voice Changer
and Skype Voice Changer etc. It can be used to change the
perceived age and gender of a speaker. Non-electronic
disguise is the method to alter the voice tone of anuttererby
disturbing his human speech production system
mechanically. Common non electronic voice disguising
methods include pinching the nostrils, clenching the jaw,
using a bite block, pulling the cheek, holding the tongue,
speaking with an object in mouth, etc.
Kajarekar et al (2006) proposed an investigation in
the effect of both electronic and non electronic voice
modifications on the speaker recognition system. The
identification includes data collection, where original and
unknown voices are collectedorrecordedfromconversation
in the telephone. For comparison purposes, it also includes
an investigation work similar to that for NIST database
extended-data speaker recognition. The results show
variation in both known/unknown voices and speaker
recognition systems to suggest a potential for coactions
between human identification and automatic recognition
systems to address this phenomenon.
Then let’s focus the voice disguise and its automatic
detection of Perrot et al (2007) proposed the problem of
voice alteration caused by channel distortion is not
presented in automatic speaker identification. A large range
of options are open to change the speaker voice and to trick
a human ear identification system. A voice can be modified
by changing the semitone of voice signal or more simply by
tapping intra-speaker variance, modification of pitch,
variations of the position of the vocal organ as lips or tongue
which change the formant frequencies. A demerit of this
method is slow learning of machine learning algorithm and
text dependent.
Then another system that is proposed by the Mireia
Farrús et al (2010) ,which describes measurement of voice
imitation and conversion in the automatic speaker
recognition. Voice can be deliberately changed by means of
human caricature or voice conversion. In the proposed
method first, analyzing some speech featuresextractedfrom
voices of impersonators attempting to mimic a target voice
and, second, using both intra gender and cross gender voice
modification which uses the spectral-based features in the
speaker recognition system. The results obtained in this
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2291
method show that the identification in the fault error rate
rises when testing with imitated voices, as well as when
using changed voices, especially the cross gender
conversions.
Among the different methods and approaches the
Speaker Identification system can use the various feature
extraction methods and classifiers for identification of voice
sample. The Feature extraction methods such as Mel
Frequency Cepstrum Coefficient (MFCC) which extract the
Statistical features of voice signal such as Mean and
Correlation Coefficient of First Order Delta coefficient and
Second Order Delta coefficient of Mel Frequency Cepstrum
Coefficient (MFCC) this features can be used for the
identification of the voice signal. Then the system uses the
Classifiers as Machine Learning Techniques such as Support
Vector Machine (SVM) classifiers for classification of human
original voice and unknown or disguised voice, the
classification is based on the features of voice samples.
2. METHODOLOGY
The Speaker Identification process can be used to
identify the original voice and unknown/disguisedvoices.In
the identification process it consistsoftwoimportant stages,
(I) feature extraction stage, which includes several feature
extraction techniques to extract the unique features of the
voice signal and (II) classification stage, which includes
several classifier to classify the original and disguised voice.
Let us discuss the two stages as detailed,
Fig-1: Block diagram of Speaker Identification
System
The Block Diagram of MFCC with SVM classifier Fig: 2.1
describe the Operation of MFCC Feature Extraction method
with the SVM classifier.
2.1 Feature Extraction
In the feature extractionprocessemploysimportant
method such as Mel Frequency Cepstral Coefficient (MFCC)
2.1.1 Mel Frequency Cepstral Coefficient (MFCC)
It takes the human perception sensitivity with
respect to frequency properties of voice signal (VR). The
word melody gives the short term word “Mel”toindicatethe
scale is based on pitch comparisons. Therefore voice tone
with a real frequency f, measured in Hz, an imminentpitchis
measured on a scale called the “Mel”scale.Mel scalefollowsa
linear scaling of frequency less than 1 KHz and a logarithmic
scaling of frequency above 1 KHz. MFCC is less sensible to
additive noise than someotherfeatureextractiontechniques
such as Linear Predictive Cepstral Coefficients (LPCC)(307).
Delta and delta-delta coefficients of MFCC also called as the
differential and acceleration coefficients. MFCC feature
extraction steps includes six steps they are
2.1.2 Steps of MFCC
The detailed descriptionofvariousstepsinvolvedin
the MFCC feature extraction is explained below.
Pre-Emphasis
Pre-emphasis is the first step of MFCC, which refers
to filtering voice signal to emphasizeittohigherfrequencies.
The voice signal can recorded in a microphone or mobile
phone from a long distance which has -6 dB/octave slope
range approximately andfewunwantednoisesareaddinthe
voice vocal cord signal(K.S.RAO). Therefore, pre-emphasis
removes noises and unwanted sound in the signal and boost
up the signal in high frequency. The pre emphasis filter is
represent by the transfer function is,
, where the value of b controls the slope of the filter and is
usually between 0.9 and 1.0.
Frame Blocking
The second step of MFCC is Frame Blocking. Here
the voice signal is blocked in to frames of M samples, which
is overlapped by N samples (N<M). The first frame consists
of the first M samples. The second frame begins N samples
after the first frame, and overlaps it by M – N samples. The
speech signal is a slowly time-varying or quasi-stationary
signal. For the static acoustic features, speech needs to be
examined over a sufficiently short period of time.
Overlapping frames are not having much
information loss and to maintain correlation between the
adjacent frames.
Windowing
The next step of MFCC is to windowed the framesof
each samples, to minimize the signal discontinuities at the
starting and ending of the each frame .It is defined by the
window function as w (m), 0 ≤ m ≤ M -1, where M is the
number of samples in every frame, then the resulting
windowing signal is
Typically the Hamming window is used, its equation is
Fast Fourier Transform
The next step is the Fast Fourier Transform, which
converts each frame of M samples from thetimedomain into
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2292
the frequency domain. FFT reduces the number of complex
multiplications and it improves the speed.
FFT is a fast algorithm is defined by the set of M
samples X (k), as follow:
, 0 ≤ k ≤ M
Where i denote the imaginary unit, i.e. i = -1, x (m) is
the complex number.
Mel-Frequency Warping
After the FFT the next step is Mel Frequency
Warping it shown human perception of the frequency
contents of speech signals, which does not follow the linear
scale. For each voice tone with a real frequency, f, measured
in Hz, and immanent pitch is measured on a scale called the
‘Mel’ scale. The Mel frequency scale is linear frequency
spacing below 1 kHz and a logarithmic spacing above 1 kHz.
Therefore the following formula can be used to calculate the
Mel for a given frequency fm in Hz is
Cepstrum
The next step is the cepstrum. Cepstrum is defined
as the logarithm of the Mel frequency wrapping. It is the
inverse Fourier transform of the logarithm of the power
spectrum of a Mel frequency signal. It is useful for
determining periodicities of the voice spectrum of signal.
The Cepstrum is denoted by the mathematical equation is,
Where s (m) is the sampled speech signal multiple
by Mel filter, and c (m) is the Cepstral signal.
Discrete Cosine Transform
Final step is to convert the Cepstral coefficients to
time domain using theDiscreteCosineTransform (DCT).The
advantage of taking the DCT is that the resulting coefficients
are real valued, which makes subsequent processing easier.
The result is called the Mel frequency cepstrum coefficients
(MFCC).
2.2 Classification
The classification process is used to classify the
original and unknown voicesbyimportanttechniquesuchas
Support Vector Machine (SVM)
2.2.1 Support Vector Machine (SVM)
Support Vector Machine (SVMs) is a useful
technique for signal/speech classification. A classification
task usually involves separating the available speech data
into training and testing sets. Each instance in the training
set contains one "target value" (i.e. the class labels) and
several "attributes" (i.e. the features or observed variables).
The goal of SVM is to produce a model (based on the training
data) which predicts the target values of the test data given
only the test data attributes. The feature vector is extracted
from the input training speech data and is used to train SVM
with linear kernel. Then the features are also extractedfrom
the testing speech data. Based on the attributes the voice is
classified to the two labels 'original' and 'Unknown'. SVM
classifies speech data by finding the best hyper plane that
separates all speech data points of one class from those of
the other class. The best hyper plane for an SVM means the
one with the largest margin between the twoclasses.Margin
means the maximal width of the slab parallel to the hyper
plane that has no interior data points (307).
3. RESULT
3.1 Database
The database of Speaker Identification analysiswas
collected from the students of Anna University Regional
Campus, Tirunelveli. Database of about 176 voices are
recorded from the 20 students and 3 Non teaching staff and
1 Assistant professor and 26 voices of various actors which
are downloaded from internet. The voice recording was text
and language independent. They were allowed to speak for
more than 5s. The 30 voices are used for training the
classifier. The 72 voices are used for testing the classifier.
3.2 Feature Extraction Result
3.2.1 Mel Frequency Cepstral Coefficient
The identification of original voice is done by using
the Speaker Identification technique. The Mean and
Correlation coefficient of MFCC and its delta and double
delta coefficients are extracted. The values of delta and
double delta coefficients also vary in original and unknown
voices. The Result of Feature extraction of MFCC is shown in
the tables.
Table no -1: Mean values of voice signal
Table no -2: Correlation coefficient values of voice
signal
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2293
3.3 Classification Result
Support Vector Machine Classificationofvoicesinto
original and unknown. In SVM Classifier the data can be
divided in to two classes. First class of data consists of +1
value which represent the voice is original. Then second
class of data consists of -1 value which representing the
voice is unknown voice.
Fig -2: Classification Result
4. CONCLUSION
An algorithm for identifying original and unknown
or disguised voices is proposed. The identificationisdone by
using the feature extraction techniques such as Mel
Frequency Cepstral Coefficient which extracts twelve
features such as the statistical moments of MFCC i.e., the
mean values and correlation coefficients of MFCC vectors,
Delta MFCC vectors and Delta Delta MFCC vectors are
extracted as acousticfeatures.Astatistical acoustic featureof
MFCC indicates the feature components of original voices
and unknown voices are altered. Thus these acoustic
features can be used to separate unknown voices and
original voices. The classificationofidentificationsystem can
be done by the SVM classifiers. The basic idea of the
proposed algorithm is that it is possible to distinguish the
original voice and unknown voices. The accuracy of the SVM
classifier is 90%.
REFERENCES
[1] Andrey Barinov, 2010. Voice Samples Recording and
Speech Quality Assessment for Forensic andAutomatic
Speaker Identification. Speech Technology Centre Ltd.
Saint Petersburg. Russia.
[2] Audio forensics in www.en.wikipedia.org/wiki/Audio
forensics for voice forensic.
[3] Darling, A.M., 1991. Properties and Implementation of
the Gammatone Filter: A Tutorial.
[4] Guang-Bin Huang, 2013. Extreme Learning Machine.
IEEE.
[5] Haojun Wu, Yong Wang, March 2014. Identification of
electronic disguised voices. IEEE Trans. Information
Forensics and Security.
[6] Jia-Ming Liu, Mingyu you et al, 2013. Cough Signal
Recognition with Gammatone Cepstral Coefficients.
IEEE.
[7] Kalamani, M., Valarmathy, S., 2015. Automatic Speech
Recognition using ELM and KNN Classifiers.
International Journal of Innovative Research in
Computer and Communication Engineering.
[8] Koustav Chakraborty, Asmita Talele, November 2014.
Voice Recognition UsingMFCCAlgorithm. International
Journal of Innovative Research in Advanced
Engineering (IJIRAE).
[9] Lindasalwa Muda, Mumtaj Begam, 2010.Voice
Recognition Algorithms using Mel Frequency Cepstral
Coefficient (MFCC) and Dynamic Time Warping (DTW)
Techniques. Journal of Computing.
[10] Lini T Lal, Avani Nath, N.J., 2015. Identification of
disguised voices using feature extraction and
classification. International Journal of Engineering
Research and General Science.
[11] MFCC in
www.practicalcryptography.com/miscellaneous/machi
ne-learning/guide-mel-frequency-cepstral-coefficients-
mfccs/ for mean and correlation coefficient.
[12] Prahlow, J., 2010. Forensic Pathology for Police. Death
Investigators, Attorneys and Forensic Scientists.
Springer Science Business Media. DOI 10.1007/978-1-
59745-404-9_2.
[13] Pragnesh Parmar, Udhayabanu, R., Jan- March 2012.
Voice Fingerprinting: A Very Important Tool against
Crime. J Indian Acad Forensic Med. vol. 34, no. 1 ISSN
0971-0973.
[14] Sanghamitra Mohantyetal,2014. SpeakerIdentification
from Oriya Voices Using SVM. International Journal of
Innovations & Advancement in Computer Science
(IJIACS). ISSN 2347 – 8616. Volume 3. Issue 8.
[15] Sonia Sunny, David Peter, S., 2013. Performance
Analysis of Different Wavelet Families in Recognizing
Speech. International Journal of Engineering Trends
and Technology- Volume4Issue4- 2013.ISSN 2231-
5381.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2294
[16] Ta-Wen Kuan, An-Chao Tsai et al., 2016. A robust BFCC
feature extraction for ASRsystem.Artificial Intelligence
Research. Volume 5 Issue 2-1927-6974.
[17] Wang, X., Zhao, Shao, Y., Jul. 2012. CASA-Based robust
speaker identification. IEEE Trans.Audio. Speech.Lang.
Processing.
[18] Xavier Valero et al, 2012. Gammatone Cepstral
Coefficients: Biologically Inspired Features for Non-
Speech Audio Classification. IEEE Transactions on
Multimedia.
[19] Xiaojia Zhao, DeLiang Wang, 2013. Analyzing Noise
Robustness of MFCC and GFCC Features in Speaker
Identification. IEEE.

More Related Content

What's hot

Classification of Language Speech Recognition System
Classification of Language Speech Recognition SystemClassification of Language Speech Recognition System
Classification of Language Speech Recognition System
ijtsrd
 
Sub band project
Sub band projectSub band project
Sub band project
Siraj Sidhik
 
Adaptive wavelet thresholding with robust hybrid features for text-independe...
Adaptive wavelet thresholding with robust hybrid features  for text-independe...Adaptive wavelet thresholding with robust hybrid features  for text-independe...
Adaptive wavelet thresholding with robust hybrid features for text-independe...
IJECEIAES
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
Anshuli Mittal
 
Dy36749754
Dy36749754Dy36749754
Dy36749754
IJERA Editor
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentation
himanshubhatti
 
Mini Project- Audio Enhancement
Mini Project-  Audio EnhancementMini Project-  Audio Enhancement
IRJET- Adverse Environment and its Compensation Approaches in Speech Recognition
IRJET- Adverse Environment and its Compensation Approaches in Speech RecognitionIRJET- Adverse Environment and its Compensation Approaches in Speech Recognition
IRJET- Adverse Environment and its Compensation Approaches in Speech Recognition
IRJET Journal
 
Speech Recognition System By Matlab
Speech Recognition System By MatlabSpeech Recognition System By Matlab
Speech Recognition System By Matlab
Ankit Gujrati
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancement
IAESIJEECS
 
COMBINED FEATURE EXTRACTION TECHNIQUES AND NAIVE BAYES CLASSIFIER FOR SPEECH ...
COMBINED FEATURE EXTRACTION TECHNIQUES AND NAIVE BAYES CLASSIFIER FOR SPEECH ...COMBINED FEATURE EXTRACTION TECHNIQUES AND NAIVE BAYES CLASSIFIER FOR SPEECH ...
COMBINED FEATURE EXTRACTION TECHNIQUES AND NAIVE BAYES CLASSIFIER FOR SPEECH ...
csandit
 
Implementation of Digital Hearing AID for Sensory Neural Impairment
Implementation of Digital Hearing AID for Sensory Neural ImpairmentImplementation of Digital Hearing AID for Sensory Neural Impairment
Implementation of Digital Hearing AID for Sensory Neural Impairment
ijtsrd
 
An Introduction To Speech Recognition
An Introduction To Speech RecognitionAn Introduction To Speech Recognition
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Automatic Speech Recognion
Automatic Speech RecognionAutomatic Speech Recognion
Automatic Speech Recognion
International Islamic University
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognition
Charu Joshi
 
Speech Signal Processing
Speech Signal ProcessingSpeech Signal Processing
Speech Signal Processing
Murtadha Alsabbagh
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
avinash raibole
 
A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLABA GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
sipij
 

What's hot (19)

Classification of Language Speech Recognition System
Classification of Language Speech Recognition SystemClassification of Language Speech Recognition System
Classification of Language Speech Recognition System
 
Sub band project
Sub band projectSub band project
Sub band project
 
Adaptive wavelet thresholding with robust hybrid features for text-independe...
Adaptive wavelet thresholding with robust hybrid features  for text-independe...Adaptive wavelet thresholding with robust hybrid features  for text-independe...
Adaptive wavelet thresholding with robust hybrid features for text-independe...
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Dy36749754
Dy36749754Dy36749754
Dy36749754
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentation
 
Mini Project- Audio Enhancement
Mini Project-  Audio EnhancementMini Project-  Audio Enhancement
Mini Project- Audio Enhancement
 
IRJET- Adverse Environment and its Compensation Approaches in Speech Recognition
IRJET- Adverse Environment and its Compensation Approaches in Speech RecognitionIRJET- Adverse Environment and its Compensation Approaches in Speech Recognition
IRJET- Adverse Environment and its Compensation Approaches in Speech Recognition
 
Speech Recognition System By Matlab
Speech Recognition System By MatlabSpeech Recognition System By Matlab
Speech Recognition System By Matlab
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancement
 
COMBINED FEATURE EXTRACTION TECHNIQUES AND NAIVE BAYES CLASSIFIER FOR SPEECH ...
COMBINED FEATURE EXTRACTION TECHNIQUES AND NAIVE BAYES CLASSIFIER FOR SPEECH ...COMBINED FEATURE EXTRACTION TECHNIQUES AND NAIVE BAYES CLASSIFIER FOR SPEECH ...
COMBINED FEATURE EXTRACTION TECHNIQUES AND NAIVE BAYES CLASSIFIER FOR SPEECH ...
 
Implementation of Digital Hearing AID for Sensory Neural Impairment
Implementation of Digital Hearing AID for Sensory Neural ImpairmentImplementation of Digital Hearing AID for Sensory Neural Impairment
Implementation of Digital Hearing AID for Sensory Neural Impairment
 
An Introduction To Speech Recognition
An Introduction To Speech RecognitionAn Introduction To Speech Recognition
An Introduction To Speech Recognition
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Automatic Speech Recognion
Automatic Speech RecognionAutomatic Speech Recognion
Automatic Speech Recognion
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognition
 
Speech Signal Processing
Speech Signal ProcessingSpeech Signal Processing
Speech Signal Processing
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
 
A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLABA GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
 

Similar to Analysis of Suitable Extraction Methods and Classifiers For Speaker Identification

Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
ijsrd.com
 
Speaker recognition on matlab
Speaker recognition on matlabSpeaker recognition on matlab
Speaker recognition on matlab
Arcanjo Salazaku
 
Ijetcas14 426
Ijetcas14 426Ijetcas14 426
Ijetcas14 426
Iasir Journals
 
Speaker Recognition Using Vocal Tract Features
Speaker Recognition Using Vocal Tract FeaturesSpeaker Recognition Using Vocal Tract Features
Speaker Recognition Using Vocal Tract Features
International Journal of Engineering Inventions www.ijeijournal.com
 
Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...
IRJET Journal
 
Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...
IRJET Journal
 
Bachelors project summary
Bachelors project summaryBachelors project summary
Bachelors project summary
Aditya Deshmukh
 
IRJET- Emotion recognition using Speech Signal: A Review
IRJET-  	  Emotion recognition using Speech Signal: A ReviewIRJET-  	  Emotion recognition using Speech Signal: A Review
IRJET- Emotion recognition using Speech Signal: A Review
IRJET Journal
 
Wavelet Based Noise Robust Features for Speaker Recognition
Wavelet Based Noise Robust Features for Speaker RecognitionWavelet Based Noise Robust Features for Speaker Recognition
Wavelet Based Noise Robust Features for Speaker Recognition
CSCJournals
 
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
IJCSEA Journal
 
Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...
IOSR Journals
 
Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...
IOSR Journals
 
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET Journal
 
Speech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using VocoderSpeech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using Vocoder
IJTET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Speaker Identification
Speaker IdentificationSpeaker Identification
Speaker Identification
sipij
 
K010416167
K010416167K010416167
K010416167
IOSR Journals
 
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
AIRCC Publishing Corporation
 
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
ijcsit
 
A Review On Speech Feature Techniques And Classification Techniques
A Review On Speech Feature Techniques And Classification TechniquesA Review On Speech Feature Techniques And Classification Techniques
A Review On Speech Feature Techniques And Classification Techniques
Nicole Heredia
 

Similar to Analysis of Suitable Extraction Methods and Classifiers For Speaker Identification (20)

Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
 
Speaker recognition on matlab
Speaker recognition on matlabSpeaker recognition on matlab
Speaker recognition on matlab
 
Ijetcas14 426
Ijetcas14 426Ijetcas14 426
Ijetcas14 426
 
Speaker Recognition Using Vocal Tract Features
Speaker Recognition Using Vocal Tract FeaturesSpeaker Recognition Using Vocal Tract Features
Speaker Recognition Using Vocal Tract Features
 
Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...
 
Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...Voice Recognition Based Automation System for Medical Applications and for Ph...
Voice Recognition Based Automation System for Medical Applications and for Ph...
 
Bachelors project summary
Bachelors project summaryBachelors project summary
Bachelors project summary
 
IRJET- Emotion recognition using Speech Signal: A Review
IRJET-  	  Emotion recognition using Speech Signal: A ReviewIRJET-  	  Emotion recognition using Speech Signal: A Review
IRJET- Emotion recognition using Speech Signal: A Review
 
Wavelet Based Noise Robust Features for Speaker Recognition
Wavelet Based Noise Robust Features for Speaker RecognitionWavelet Based Noise Robust Features for Speaker Recognition
Wavelet Based Noise Robust Features for Speaker Recognition
 
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
 
Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...
 
Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...Speech Recognized Automation System Using Speaker Identification through Wire...
Speech Recognized Automation System Using Speaker Identification through Wire...
 
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
 
Speech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using VocoderSpeech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using Vocoder
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Speaker Identification
Speaker IdentificationSpeaker Identification
Speaker Identification
 
K010416167
K010416167K010416167
K010416167
 
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
 
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
CURVELET BASED SPEECH RECOGNITION SYSTEM IN NOISY ENVIRONMENT: A STATISTICAL ...
 
A Review On Speech Feature Techniques And Classification Techniques
A Review On Speech Feature Techniques And Classification TechniquesA Review On Speech Feature Techniques And Classification Techniques
A Review On Speech Feature Techniques And Classification Techniques
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 

Recently uploaded (20)

Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 

Analysis of Suitable Extraction Methods and Classifiers For Speaker Identification

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2290 ANALYSIS OF SUITABLE EXTRACTION METHODS AND CLASSIFIERS FOR SPEAKER IDENTIFICATION R.ARUL JOTHI M.E Applied Electronics, Dept. of ECE, Anna University Regional Campus, Tirunelveli ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - SpeakerIdentificationsystemplaysan important role in the identification of human voice and disguised voices especially in the cases of telephoned bomb threat and demand of money in kidnapping cases etc. A suitablefeatureextraction technique which captures the unique characteristics of voice signal can be used to identify criminals. Here Purposed Mel Frequency Cepstrum Coefficient (MFCC) feature extraction method is used; Mel FrequencyCepstrumCoefficientcanfollow the frequency spectral properties.. Thenanalgorithmbased on the extracted features are investigated with the Machine Learning techniques such as SVM(Support Vector Machine)Classifier is purposed to classifies the human voice and disguised voices. The experimental result indicates the proposed system, compared with MFCC with SVM classifier improves the performances of Speaker Identification system and accuracy rates up to 90%. Key Words: Mel Frequency Cepstral Coefficient (MFCC), Support Vector Machine (SVM), Linear Predictive Cepstral Coefficient (LPCC), Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT). 1. INTRODUCTION Speaker Identification system requires two recording voice samples i.e., an original voice of suspected person and a disguised or unknown voice sample. The disguised or unknown voice sample that can be recorded from the cellular phone calls, telephone calls or tape- recorder recording samples is usually taken from the police department. The speech recording system of Andrey Baranov et al (2010) proposed system which, consists of several parameters to improvetherecordingspeechsamplethey are overloading, reverberationandcompressionetc.Thesorting of signal amplitude limitation is done by overloading, it occurs due to the dynamic range of recording chain sample which cannot match with the dynamic range of unknown recording voice signal. It causes the negative acceptance of frequency in the phonetic quality of voice signal. Next lets to study about the voicedisguisinginvoice forensic system, that is the process bywhichanutterervoice tone gets changed and helps in hiding his/her individuality. Voice disguise has two types they are Intentional voice and Unintentional voice. Intentional voice can also classify into two types they are Electronic disguise voice and Non Electronic disguisevoice.Electronicdisguisedvoiceobtained by using electronic scrambling devices to modify frequency spectral properties such as the voice pitch and voice formants of an original voice. The original voice has been changed by using some software’s such as AV Voice Changer and Skype Voice Changer etc. It can be used to change the perceived age and gender of a speaker. Non-electronic disguise is the method to alter the voice tone of anuttererby disturbing his human speech production system mechanically. Common non electronic voice disguising methods include pinching the nostrils, clenching the jaw, using a bite block, pulling the cheek, holding the tongue, speaking with an object in mouth, etc. Kajarekar et al (2006) proposed an investigation in the effect of both electronic and non electronic voice modifications on the speaker recognition system. The identification includes data collection, where original and unknown voices are collectedorrecordedfromconversation in the telephone. For comparison purposes, it also includes an investigation work similar to that for NIST database extended-data speaker recognition. The results show variation in both known/unknown voices and speaker recognition systems to suggest a potential for coactions between human identification and automatic recognition systems to address this phenomenon. Then let’s focus the voice disguise and its automatic detection of Perrot et al (2007) proposed the problem of voice alteration caused by channel distortion is not presented in automatic speaker identification. A large range of options are open to change the speaker voice and to trick a human ear identification system. A voice can be modified by changing the semitone of voice signal or more simply by tapping intra-speaker variance, modification of pitch, variations of the position of the vocal organ as lips or tongue which change the formant frequencies. A demerit of this method is slow learning of machine learning algorithm and text dependent. Then another system that is proposed by the Mireia Farrús et al (2010) ,which describes measurement of voice imitation and conversion in the automatic speaker recognition. Voice can be deliberately changed by means of human caricature or voice conversion. In the proposed method first, analyzing some speech featuresextractedfrom voices of impersonators attempting to mimic a target voice and, second, using both intra gender and cross gender voice modification which uses the spectral-based features in the speaker recognition system. The results obtained in this
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2291 method show that the identification in the fault error rate rises when testing with imitated voices, as well as when using changed voices, especially the cross gender conversions. Among the different methods and approaches the Speaker Identification system can use the various feature extraction methods and classifiers for identification of voice sample. The Feature extraction methods such as Mel Frequency Cepstrum Coefficient (MFCC) which extract the Statistical features of voice signal such as Mean and Correlation Coefficient of First Order Delta coefficient and Second Order Delta coefficient of Mel Frequency Cepstrum Coefficient (MFCC) this features can be used for the identification of the voice signal. Then the system uses the Classifiers as Machine Learning Techniques such as Support Vector Machine (SVM) classifiers for classification of human original voice and unknown or disguised voice, the classification is based on the features of voice samples. 2. METHODOLOGY The Speaker Identification process can be used to identify the original voice and unknown/disguisedvoices.In the identification process it consistsoftwoimportant stages, (I) feature extraction stage, which includes several feature extraction techniques to extract the unique features of the voice signal and (II) classification stage, which includes several classifier to classify the original and disguised voice. Let us discuss the two stages as detailed, Fig-1: Block diagram of Speaker Identification System The Block Diagram of MFCC with SVM classifier Fig: 2.1 describe the Operation of MFCC Feature Extraction method with the SVM classifier. 2.1 Feature Extraction In the feature extractionprocessemploysimportant method such as Mel Frequency Cepstral Coefficient (MFCC) 2.1.1 Mel Frequency Cepstral Coefficient (MFCC) It takes the human perception sensitivity with respect to frequency properties of voice signal (VR). The word melody gives the short term word “Mel”toindicatethe scale is based on pitch comparisons. Therefore voice tone with a real frequency f, measured in Hz, an imminentpitchis measured on a scale called the “Mel”scale.Mel scalefollowsa linear scaling of frequency less than 1 KHz and a logarithmic scaling of frequency above 1 KHz. MFCC is less sensible to additive noise than someotherfeatureextractiontechniques such as Linear Predictive Cepstral Coefficients (LPCC)(307). Delta and delta-delta coefficients of MFCC also called as the differential and acceleration coefficients. MFCC feature extraction steps includes six steps they are 2.1.2 Steps of MFCC The detailed descriptionofvariousstepsinvolvedin the MFCC feature extraction is explained below. Pre-Emphasis Pre-emphasis is the first step of MFCC, which refers to filtering voice signal to emphasizeittohigherfrequencies. The voice signal can recorded in a microphone or mobile phone from a long distance which has -6 dB/octave slope range approximately andfewunwantednoisesareaddinthe voice vocal cord signal(K.S.RAO). Therefore, pre-emphasis removes noises and unwanted sound in the signal and boost up the signal in high frequency. The pre emphasis filter is represent by the transfer function is, , where the value of b controls the slope of the filter and is usually between 0.9 and 1.0. Frame Blocking The second step of MFCC is Frame Blocking. Here the voice signal is blocked in to frames of M samples, which is overlapped by N samples (N<M). The first frame consists of the first M samples. The second frame begins N samples after the first frame, and overlaps it by M – N samples. The speech signal is a slowly time-varying or quasi-stationary signal. For the static acoustic features, speech needs to be examined over a sufficiently short period of time. Overlapping frames are not having much information loss and to maintain correlation between the adjacent frames. Windowing The next step of MFCC is to windowed the framesof each samples, to minimize the signal discontinuities at the starting and ending of the each frame .It is defined by the window function as w (m), 0 ≤ m ≤ M -1, where M is the number of samples in every frame, then the resulting windowing signal is Typically the Hamming window is used, its equation is Fast Fourier Transform The next step is the Fast Fourier Transform, which converts each frame of M samples from thetimedomain into
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2292 the frequency domain. FFT reduces the number of complex multiplications and it improves the speed. FFT is a fast algorithm is defined by the set of M samples X (k), as follow: , 0 ≤ k ≤ M Where i denote the imaginary unit, i.e. i = -1, x (m) is the complex number. Mel-Frequency Warping After the FFT the next step is Mel Frequency Warping it shown human perception of the frequency contents of speech signals, which does not follow the linear scale. For each voice tone with a real frequency, f, measured in Hz, and immanent pitch is measured on a scale called the ‘Mel’ scale. The Mel frequency scale is linear frequency spacing below 1 kHz and a logarithmic spacing above 1 kHz. Therefore the following formula can be used to calculate the Mel for a given frequency fm in Hz is Cepstrum The next step is the cepstrum. Cepstrum is defined as the logarithm of the Mel frequency wrapping. It is the inverse Fourier transform of the logarithm of the power spectrum of a Mel frequency signal. It is useful for determining periodicities of the voice spectrum of signal. The Cepstrum is denoted by the mathematical equation is, Where s (m) is the sampled speech signal multiple by Mel filter, and c (m) is the Cepstral signal. Discrete Cosine Transform Final step is to convert the Cepstral coefficients to time domain using theDiscreteCosineTransform (DCT).The advantage of taking the DCT is that the resulting coefficients are real valued, which makes subsequent processing easier. The result is called the Mel frequency cepstrum coefficients (MFCC). 2.2 Classification The classification process is used to classify the original and unknown voicesbyimportanttechniquesuchas Support Vector Machine (SVM) 2.2.1 Support Vector Machine (SVM) Support Vector Machine (SVMs) is a useful technique for signal/speech classification. A classification task usually involves separating the available speech data into training and testing sets. Each instance in the training set contains one "target value" (i.e. the class labels) and several "attributes" (i.e. the features or observed variables). The goal of SVM is to produce a model (based on the training data) which predicts the target values of the test data given only the test data attributes. The feature vector is extracted from the input training speech data and is used to train SVM with linear kernel. Then the features are also extractedfrom the testing speech data. Based on the attributes the voice is classified to the two labels 'original' and 'Unknown'. SVM classifies speech data by finding the best hyper plane that separates all speech data points of one class from those of the other class. The best hyper plane for an SVM means the one with the largest margin between the twoclasses.Margin means the maximal width of the slab parallel to the hyper plane that has no interior data points (307). 3. RESULT 3.1 Database The database of Speaker Identification analysiswas collected from the students of Anna University Regional Campus, Tirunelveli. Database of about 176 voices are recorded from the 20 students and 3 Non teaching staff and 1 Assistant professor and 26 voices of various actors which are downloaded from internet. The voice recording was text and language independent. They were allowed to speak for more than 5s. The 30 voices are used for training the classifier. The 72 voices are used for testing the classifier. 3.2 Feature Extraction Result 3.2.1 Mel Frequency Cepstral Coefficient The identification of original voice is done by using the Speaker Identification technique. The Mean and Correlation coefficient of MFCC and its delta and double delta coefficients are extracted. The values of delta and double delta coefficients also vary in original and unknown voices. The Result of Feature extraction of MFCC is shown in the tables. Table no -1: Mean values of voice signal Table no -2: Correlation coefficient values of voice signal
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2293 3.3 Classification Result Support Vector Machine Classificationofvoicesinto original and unknown. In SVM Classifier the data can be divided in to two classes. First class of data consists of +1 value which represent the voice is original. Then second class of data consists of -1 value which representing the voice is unknown voice. Fig -2: Classification Result 4. CONCLUSION An algorithm for identifying original and unknown or disguised voices is proposed. The identificationisdone by using the feature extraction techniques such as Mel Frequency Cepstral Coefficient which extracts twelve features such as the statistical moments of MFCC i.e., the mean values and correlation coefficients of MFCC vectors, Delta MFCC vectors and Delta Delta MFCC vectors are extracted as acousticfeatures.Astatistical acoustic featureof MFCC indicates the feature components of original voices and unknown voices are altered. Thus these acoustic features can be used to separate unknown voices and original voices. The classificationofidentificationsystem can be done by the SVM classifiers. The basic idea of the proposed algorithm is that it is possible to distinguish the original voice and unknown voices. The accuracy of the SVM classifier is 90%. REFERENCES [1] Andrey Barinov, 2010. Voice Samples Recording and Speech Quality Assessment for Forensic andAutomatic Speaker Identification. Speech Technology Centre Ltd. Saint Petersburg. Russia. [2] Audio forensics in www.en.wikipedia.org/wiki/Audio forensics for voice forensic. [3] Darling, A.M., 1991. Properties and Implementation of the Gammatone Filter: A Tutorial. [4] Guang-Bin Huang, 2013. Extreme Learning Machine. IEEE. [5] Haojun Wu, Yong Wang, March 2014. Identification of electronic disguised voices. IEEE Trans. Information Forensics and Security. [6] Jia-Ming Liu, Mingyu you et al, 2013. Cough Signal Recognition with Gammatone Cepstral Coefficients. IEEE. [7] Kalamani, M., Valarmathy, S., 2015. Automatic Speech Recognition using ELM and KNN Classifiers. International Journal of Innovative Research in Computer and Communication Engineering. [8] Koustav Chakraborty, Asmita Talele, November 2014. Voice Recognition UsingMFCCAlgorithm. International Journal of Innovative Research in Advanced Engineering (IJIRAE). [9] Lindasalwa Muda, Mumtaj Begam, 2010.Voice Recognition Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques. Journal of Computing. [10] Lini T Lal, Avani Nath, N.J., 2015. Identification of disguised voices using feature extraction and classification. International Journal of Engineering Research and General Science. [11] MFCC in www.practicalcryptography.com/miscellaneous/machi ne-learning/guide-mel-frequency-cepstral-coefficients- mfccs/ for mean and correlation coefficient. [12] Prahlow, J., 2010. Forensic Pathology for Police. Death Investigators, Attorneys and Forensic Scientists. Springer Science Business Media. DOI 10.1007/978-1- 59745-404-9_2. [13] Pragnesh Parmar, Udhayabanu, R., Jan- March 2012. Voice Fingerprinting: A Very Important Tool against Crime. J Indian Acad Forensic Med. vol. 34, no. 1 ISSN 0971-0973. [14] Sanghamitra Mohantyetal,2014. SpeakerIdentification from Oriya Voices Using SVM. International Journal of Innovations & Advancement in Computer Science (IJIACS). ISSN 2347 – 8616. Volume 3. Issue 8. [15] Sonia Sunny, David Peter, S., 2013. Performance Analysis of Different Wavelet Families in Recognizing Speech. International Journal of Engineering Trends and Technology- Volume4Issue4- 2013.ISSN 2231- 5381.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2294 [16] Ta-Wen Kuan, An-Chao Tsai et al., 2016. A robust BFCC feature extraction for ASRsystem.Artificial Intelligence Research. Volume 5 Issue 2-1927-6974. [17] Wang, X., Zhao, Shao, Y., Jul. 2012. CASA-Based robust speaker identification. IEEE Trans.Audio. Speech.Lang. Processing. [18] Xavier Valero et al, 2012. Gammatone Cepstral Coefficients: Biologically Inspired Features for Non- Speech Audio Classification. IEEE Transactions on Multimedia. [19] Xiaojia Zhao, DeLiang Wang, 2013. Analyzing Noise Robustness of MFCC and GFCC Features in Speaker Identification. IEEE.