SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
DOI: 10.5121/ijci.2016.5414 117
GENERAL KALMAN FILTER & SPEECH
ENHANCEMENT FOR SPEAKER
IDENTIFICATION
Vijay Kiran Battula and Appala Naidu Gottapu
Department of ECE, JNTUK-UCEV, Vizianagaram, Andhra Pradesh, India
ABSTRACT
Presence of noise increases the dimension of the information. A noise suppression algorithm is developed
with an idea of combining the General Kalman Filter and Estimate Maximization (EM) frame work.This
combination is helpful and effective in identifying noise characteristics of an acoustic environment.
Recursion between Estimate step and Maximization step enabled the algorithm to deal any model of noise.
The same Speech enhancement procedure in applied in the pre-processing stage of a conventional Speaker
identification method. Due to the non-stationary nature of noise and speech adaptive algorithms are
required. Algorithm is first applied for Speech enhancement problem and then extended to using it in the
pre-processing step of the Speaker identification. The present work is compared in terms of significant
metrics with existing and popular algorithms and results show that the developed algorithm is dominant
over them.
KEYWORDS
Speech processing, Speech enhancement, Speaker identification, General Kalman filter and EM algorithm
1. INTRODUCTION
The two major applications of the speech processing namely speech enhancement and speaker
identification are inter related in terms of the core techniques used for performing them. Speech
enhancement directly resembles the pre-processing stage of the speaker identification procedure
in most of the cases. The work depicts the relation and significance of developing an algorithm to
address the core areas of their respective step wise procedure is the area of interest.
Speech and noise in a natural environment always finds in a combined form, Speech is every time
degraded by the noise. General assumption is to always find an addiction of Gaussian noise to the
speech information signal. This noise varies in its characteristics for different acoustic
environments. The idea is to develop a robust algorithm to deal a noise of any environment that is
degrading speech. Elimination of noise could be even possible through the transducers like
microphone used to record the speech information and convert them to the electrical equivalent
representation. There are techniques developed based on the number of microphones to be used
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
118
to identify the noise components in the signal. The present work is based on Single microphone
speech enhancement.
Noise in the problem is first modelled as an Auto Regressive process. This performed as in [3].
Estimate Maximization frame work is studied which involves speech enhancement and as well as
parameter estimation. General Kalman Filter(GKF) is a time domain algorithm first studied for
using it system identification problem like echo cancellation in [4]. In Echo cancellation echo
path estimation is performed using GKF. For extending the General Kalman filter to the speech
enhancement it has to be given with at least one among the knowledge of two characteristics of
speech or noise. EM frame work helps in providing the noise characteristics.
The time domain implementation of the Kalman filter is difficult and not dominant. G.Enzner
through his studies proposed the effective implementation of Kalman filter in frequency domain
[2]. But GKF is time domain implemented version of Kalman filter and hence draws the
attention. Speaker Recognition is a part behavioural characteristic of the Biometrics. The two
major classifications are Speaker verification and Speaker identification namely. Speaker
identification can be either text dependent or text independent. In this paper a text independent
speaker identification method is considered with a pre-processing stage of developed algorithm.
2. DEFINITION OF THE PROBLEM AND RELATED CONCEPTS
)(nx is a noisy speech signal, )(ns and )(nv are its two components.
)()()( nvnsnx +=
Clean speech signal is represented with )(ns and it obtained by supressing additive noise )(nv in
)(nx .
2.1. Aim
Single microphone is used to record the degraded speech. The developed algorithm is aimed to
use in studying then noise characteristics and suppression of the noise components from the
signal. Thus to provide the speech quality enhancement and intelligibility.
2.2. General Kalman Filter
In [4] General Kalman filter is implemented with two estimation problems. The first is a hidden
Markov modelled impulse response coefficient estimation and the second is the estimation of
desired response with knowledge of the above estimated coefficients and far end signal. In this
work the problem is redefined to fit for a speech enhancement problem. The similar coefficient
estimation is equivalent to the change affecting the noise characteristics of the acoustic
environment under consideration. And these are updated for find new noise model from previous
effects as recursive process by applying estimate maximization frame work.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
119
2.3. Estimate Maximization frame work
There are two steps in this process namely estimation step and maximization step. It is a recursive
procedure. And the ending if the recursion is predefined or left to the intelligibility of the
algorithm. General Kalman filter provides estimation of the required entity in estimation step.
These parameters involved in the estimation are identified and updated in the maximization or
parameter estimation step and again fed to estimation step. This repeats as an iterative process
until the clean entity of interest is obtained.
2.4. Proposed Methods
The Figure 1 represent the block diagram of combined speech enhancement for speaker
identification, the first half of the diagram illustrates the process flow of speech enhancement as
follows
i. Noise degraded speech information is collected through single microphone.
ii. This is given to the speech enhancement stage.
iii. The first step of speech enhancement contains the segmentation of speech signal
satisfying the stationary condition of the signal.
iv. Thus frames are extracted from the source information and each frame is now forwarded
for noise suppression individually.
v. The AR model of the noise of the acoustic environment is acquired prior to the above
steps and state space formulation is done to it.
vi. The estimation process starts by giving noise estimate and present speech frame to
General Kalman filter to find optimum output.
vii. The parameters are updated in maximization step and again given to GKF for new
estimation
viii. This Process continues until clean speech frame is obtained for a fixed number of
iterations.
ix. Finally all the frames are concatenated to obtain clean speech.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
120
Figure1. Proposed Speech Enhancement for Speaker identification
Figure 1 represents the proposed method for Speaker identification
i. The initial stage of speaker identifications always be the speech enhancement stage. The
output of the Speech enhancement stage is a clean speech.
ii. Training phase and Verification are two stages of identification. In training phase speech
features of the concerned group are collected and stored in data base.
iii. In verification stage they are retrieved to compare with the features of persons speech
waiting for authentication.
iv. If the matching criteria satisfies authentication is provided otherwise rejected.
v. In this paper Eigen features based speech features are extracted in feature extraction
stage. MFCC range of frequencies is under consideration.
vi. Dimensionality reduction techniques like principal component analysis (PCA) and
Independent Component analysis (ICA) used for reducing the feature space.
vii. Genetic Algorithm is used for verification procedure to provide optimum results and the
cost function of it is defined below.
( ) ( )
21
1 11
2
),(max)(max ∑ ∑∑
−
= +==
+
L
m
L
nm
L
m
nmPmR λ (1)
R=Auto correlation (Correlation between each speech feature itself), P=Cross Correlation
(Correlation between speech feature with other speech feature),L=Length of each
speech feature,Weighing factorλ
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
121
3. ALGORITHM
3.1. Auto Regressive modelling of noise
Let us consider the problem in a discrete time index of n,
)()()( nvnsnx += (2)
Noise and speech are non-stationary. Hence, any one of them has to be known in order to go for
formulation. Consider the speech absent periods to study noise characteristics,
)()( 0 nvnx = (3)
Where )(0 nv is signal collected by recording device when speech is absent and use as initial
signal vector of noise. Noise is modelled as stochastic AR process:
∑=
+−−=
k
q
v
v
q nu
g
knvnv
1
)(
2
)()( λ (4)
1λ , 2λ ,… kλ represents AR parameters of noise process and vg represents power level. )(nuv is
normalized (zero-mean unit variance),white Gaussian noise.
3.2. E-step
AR model of noise process is converted into state space formulation
)](),......,2(),1([)( nvknvknvnv
T
k +−+−=




















−−−−−−
=Φ
−−− 12321 ............
..................
.
.
.
.
.
.
............
.
.
.
.
.
.
.
.
.
.
.
.
00............010.0
00............0010
λλλλλλ kkkk
v
is noise transition matrix and k-
dimensional vectors [ ]v
T
v gg .......00= .The below equation provides estimate of noise
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
122
)()()1()( nungnvnv vvkvk +−Φ= (5)
)()()()( nvnhnsnx k
T
v+= (6)
)()()()( nvnhnxns k
T
v−= (7)
3.3. M-step
Parameters for estimate and AR model, GKF algorithm procedural steps results in finding the
minimal error and optimal estimate. The following are the related equations
Initialize with 0)(ˆ =nhv and qIR εµ =)0( where ε is small positive constant
)()1(ˆ)(ˆ nwnhnh vv +−= (8)
)()()()( nvnhnsnx k
T
v+= (9)
)(ˆ)()( nvnxne −= (10)
qwm InnRnR )()1()( 2
σµ +−= (11)
pvkm
T
ke InnvnRnvnR )()()()()( 2
σ+= (12)
)()()()( 1
nRnvnRnK ekm
−
= (13)
)1(ˆ)()()( −−= nhnvnxne v
T
k (14)
)()()1(ˆ)(ˆ nenKnhnh vv +−= (15)
)()]()([)( nRnvnKInR m
T
kq −=µ (16)
Where )(nRm is priori misalignment, )(nRµ is posteriori misalignment correlation matrix,
)(nK is Kalman gain, qI is identity matrix, )(2
nwσ is variance of )(nw , )(nRe is priori error
vector correlation matrix and )(ne is error between signal and estimated.
Let θ be the vector of unknown parameters and given as vector [ ]v
TT
gλθ =
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
123
)1()1( −−= nvnvZ T
qq (17)
)()1( nvnvY q −= (18)
Where updated parameters are defined as
∑ ∑−=+
YZEq
][ˆ )1(
λ (19)
( )∑ 


 += ++
][ˆˆ )1()1(
YEZg
Tqq
v λ . (20)
4. RESULTS
4.1. Simulation and Metrics
NOIZEUS speech corpus contains noisy speech signals. These are directly used to test the
performance of the proposed algorithm. The similar experiments are conducted with popular
algorithms and are used for comparison. Peak signal to Noise ratio and Mean square error are
used to evaluate performance for Speech enhancement. Identification rate and elapsed time for a
fixed number of generations are compared for Speaker identification. Simulations are performed
in MATLAB platform and respective analysis is presented below.
Figure 2. Noisy and GKF enhanced babble noise type of SNR 0dB, 5dB, 15dB
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
124
Figure 3.PSNR and MSE comparison of SS, NLMS, RLS, APA and GKF (Speech Enhancement)
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
125
Figure 4. Identification rate comparison of different processing method combinations (Speaker
Identification)
5. CONCLUSIONS
General Kalman filter resembles Affine projection algorithm (APA) for certain considerations but
the combination with Estimate Maximization is more efficient for GKF. Figure 2 presents the
MATLAB simulated results of babble noise type of various SNR levels. Figure 3 is the analysis
of proposed algorithm, Normalized least mean square algorithm, Recursive least squares, APA
and Spectral subtraction for Speech enhancement applications. Proposed algorithm has given
better results in terms of Mean square error and Peak signal to noise ratio. Figure 4 clearly shows
the dimensionality reduction effect on the speaker identification system with change in filtration
scheme. The respective identification rates and elapsed time of different methods and
combination under considerations presented in figure 4 shows GKF is optimum. This work could
be further extended to real time and then performance has to analyzed to know its compatibility.
REFERENCES
[1] R. E. Kalman, “A new approach to linear filtering and prediction problems,”J. Basic Eng., vol.82, pp.
35–45, Mar. 1960.
[2] G. Enzner and P. Vary, “Frequency-domain adaptive Kalman filter foracoustic echo control in hands-
free telephones,” Signal Process., vol.86, pp. 1140–1156, 2006.
[3] Jae Lim; A. Oppenheim, “All-pole modeling of degraded speech,” IEEE Transactions on Acoustics,
Speech, and Signal ProcessingYear: 1978, Volume: 26, Issue: 3
[4] C. Paleologu, J. Benesty, and S. Ciochina, “Study of the general Kalman ˘filter for echo
cancellation,” IEEE Trans. Audio, Speech, LanguageProcessing, vol. 21, pp. 1539–1549, Aug. 2013.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
126
[5] S. E. Bou-Ghazale and K. Assaleh, “A robust endpoint detection of speech for noisy environments
with application to automatic speech recognition,” in Proc. ICASSP2002, vol. 4, pp. 3808–3811,
2002.
[6] S. Gannot, “Speech processing utilizing the Kalman filter,” IEEE Instrum. Meas. Mag., vol. 15, no. 3,
pp. 10–14, Jun. 2012.
[7] T. Kishore Kumar, Siva Prasad Nandyala, Ravi Bolimera,” Speech Enhancement using Spectral
Subtraction,Affine Projection Algorithms and Classical AdaptiveFilters ,” International Conference
On Advances In Electronics, Electrical And Computer Science Engineering - EEC 2012
[8] Sadaoki Furui, “50 Years of Progress in Speech and Speaker Recognition Research,” Ecti
Transactions on computer and Information Technology, Vol.1, No.2, November 2005
[9] Omar Daoud, Abdel-Rahman Al-Qawasmi and Khaled daqrouq, “Modified PCA Speaker
Identification Based System Using Wavelet Transform and Neural Networks,” International Journal
of Recent Trends in Engineering, Vol 2, No. 5, November 2009.
[10] Reynolds, D.A., “Experimental evaluation of features for robust speaker identification,” IEEE
Transactions on SAP, Vol. 2, pp. 639-643, 2008.
[11] K. Koteswara rao, G. Appala Naidu, “Eigen features based speaker identification model using
Genetic algorithm,” VSPICE-2k15 National conference, JNTU KAKINADA
AUTHORS
B.Vijay Kiran received B.Tech degree from JNTUK and currently pursuing M.Tech
degree in UCEV Vizianagaram, JNT University Kakinada and Vizianagaram.
G. Appala Naidu received both B.Tech and M.Tech degrees from JNTUH. He is
currently working in University College of Engineering Vizianagaram, JNT University
Kakinada, and Vizianagaram.

More Related Content

What's hot

Room Transfer Function Estimation and Room Equalization in Noise Environments
Room Transfer Function Estimation and Room Equalization in Noise EnvironmentsRoom Transfer Function Estimation and Room Equalization in Noise Environments
Room Transfer Function Estimation and Room Equalization in Noise EnvironmentsIJERA Editor
 
A New Method for Pitch Tracking and Voicing Decision Based on Spectral Multi-...
A New Method for Pitch Tracking and Voicing Decision Based on Spectral Multi-...A New Method for Pitch Tracking and Voicing Decision Based on Spectral Multi-...
A New Method for Pitch Tracking and Voicing Decision Based on Spectral Multi-...CSCJournals
 
05 comparative study of voice print based acoustic features mfcc and lpcc
05 comparative study of voice print based acoustic features mfcc and lpcc05 comparative study of voice print based acoustic features mfcc and lpcc
05 comparative study of voice print based acoustic features mfcc and lpccIJAEMSJORNAL
 
Performance Analysis of Acoustic Echo Cancellation Techniques
Performance Analysis of Acoustic Echo Cancellation TechniquesPerformance Analysis of Acoustic Echo Cancellation Techniques
Performance Analysis of Acoustic Echo Cancellation TechniquesIJERA Editor
 
VOICE PASSWORD BASED SPEAKER VERIFICATION SYSTEM USING VOWEL AND NON VOWEL RE...
VOICE PASSWORD BASED SPEAKER VERIFICATION SYSTEM USING VOWEL AND NON VOWEL RE...VOICE PASSWORD BASED SPEAKER VERIFICATION SYSTEM USING VOWEL AND NON VOWEL RE...
VOICE PASSWORD BASED SPEAKER VERIFICATION SYSTEM USING VOWEL AND NON VOWEL RE...niranjan kumar
 
Environmental Sound detection Using MFCC technique
Environmental Sound detection Using MFCC techniqueEnvironmental Sound detection Using MFCC technique
Environmental Sound detection Using MFCC techniquePankaj Kumar
 
Adaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementAdaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementHarshal Ladhe
 
Performance analysis of the convolutional recurrent neural network on acousti...
Performance analysis of the convolutional recurrent neural network on acousti...Performance analysis of the convolutional recurrent neural network on acousti...
Performance analysis of the convolutional recurrent neural network on acousti...journalBEEI
 
FIR Filter Design using Particle Swarm Optimization with Constriction Factor ...
FIR Filter Design using Particle Swarm Optimization with Constriction Factor ...FIR Filter Design using Particle Swarm Optimization with Constriction Factor ...
FIR Filter Design using Particle Swarm Optimization with Constriction Factor ...IDES Editor
 
Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...
Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...
Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...TELKOMNIKA JOURNAL
 
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...IJERA Editor
 
Hybrid hmmdtw based speech recognition with kernel adaptive filtering method
Hybrid hmmdtw based speech recognition with kernel adaptive filtering methodHybrid hmmdtw based speech recognition with kernel adaptive filtering method
Hybrid hmmdtw based speech recognition with kernel adaptive filtering methodijcsa
 
SPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITIONSPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITIONniranjan kumar
 
E0502 01 2327
E0502 01 2327E0502 01 2327
E0502 01 2327IJMER
 
Isolated words recognition using mfcc, lpc and neural network
Isolated words recognition using mfcc, lpc and neural networkIsolated words recognition using mfcc, lpc and neural network
Isolated words recognition using mfcc, lpc and neural networkeSAT Journals
 
Speaker identification
Speaker identificationSpeaker identification
Speaker identificationTriloki Gupta
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approachijsrd.com
 
IRJET- Pitch Detection Algorithms in Time Domain
IRJET- Pitch Detection Algorithms in Time DomainIRJET- Pitch Detection Algorithms in Time Domain
IRJET- Pitch Detection Algorithms in Time DomainIRJET Journal
 

What's hot (20)

Room Transfer Function Estimation and Room Equalization in Noise Environments
Room Transfer Function Estimation and Room Equalization in Noise EnvironmentsRoom Transfer Function Estimation and Room Equalization in Noise Environments
Room Transfer Function Estimation and Room Equalization in Noise Environments
 
A New Method for Pitch Tracking and Voicing Decision Based on Spectral Multi-...
A New Method for Pitch Tracking and Voicing Decision Based on Spectral Multi-...A New Method for Pitch Tracking and Voicing Decision Based on Spectral Multi-...
A New Method for Pitch Tracking and Voicing Decision Based on Spectral Multi-...
 
05 comparative study of voice print based acoustic features mfcc and lpcc
05 comparative study of voice print based acoustic features mfcc and lpcc05 comparative study of voice print based acoustic features mfcc and lpcc
05 comparative study of voice print based acoustic features mfcc and lpcc
 
G010424248
G010424248G010424248
G010424248
 
Performance Analysis of Acoustic Echo Cancellation Techniques
Performance Analysis of Acoustic Echo Cancellation TechniquesPerformance Analysis of Acoustic Echo Cancellation Techniques
Performance Analysis of Acoustic Echo Cancellation Techniques
 
VOICE PASSWORD BASED SPEAKER VERIFICATION SYSTEM USING VOWEL AND NON VOWEL RE...
VOICE PASSWORD BASED SPEAKER VERIFICATION SYSTEM USING VOWEL AND NON VOWEL RE...VOICE PASSWORD BASED SPEAKER VERIFICATION SYSTEM USING VOWEL AND NON VOWEL RE...
VOICE PASSWORD BASED SPEAKER VERIFICATION SYSTEM USING VOWEL AND NON VOWEL RE...
 
Environmental Sound detection Using MFCC technique
Environmental Sound detection Using MFCC techniqueEnvironmental Sound detection Using MFCC technique
Environmental Sound detection Using MFCC technique
 
Adaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancementAdaptive noise estimation algorithm for speech enhancement
Adaptive noise estimation algorithm for speech enhancement
 
Performance analysis of the convolutional recurrent neural network on acousti...
Performance analysis of the convolutional recurrent neural network on acousti...Performance analysis of the convolutional recurrent neural network on acousti...
Performance analysis of the convolutional recurrent neural network on acousti...
 
FIR Filter Design using Particle Swarm Optimization with Constriction Factor ...
FIR Filter Design using Particle Swarm Optimization with Constriction Factor ...FIR Filter Design using Particle Swarm Optimization with Constriction Factor ...
FIR Filter Design using Particle Swarm Optimization with Constriction Factor ...
 
Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...
Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...
Comparison of Feature Extraction MFCC and LPC in Automatic Speech Recognition...
 
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
 
Hybrid hmmdtw based speech recognition with kernel adaptive filtering method
Hybrid hmmdtw based speech recognition with kernel adaptive filtering methodHybrid hmmdtw based speech recognition with kernel adaptive filtering method
Hybrid hmmdtw based speech recognition with kernel adaptive filtering method
 
SPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITIONSPEKER RECOGNITION UNDER LIMITED DATA CODITION
SPEKER RECOGNITION UNDER LIMITED DATA CODITION
 
E0502 01 2327
E0502 01 2327E0502 01 2327
E0502 01 2327
 
Isolated words recognition using mfcc, lpc and neural network
Isolated words recognition using mfcc, lpc and neural networkIsolated words recognition using mfcc, lpc and neural network
Isolated words recognition using mfcc, lpc and neural network
 
Speaker identification
Speaker identificationSpeaker identification
Speaker identification
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
 
IRJET- Pitch Detection Algorithms in Time Domain
IRJET- Pitch Detection Algorithms in Time DomainIRJET- Pitch Detection Algorithms in Time Domain
IRJET- Pitch Detection Algorithms in Time Domain
 
SPEAKER VERIFICATION
SPEAKER VERIFICATIONSPEAKER VERIFICATION
SPEAKER VERIFICATION
 

Viewers also liked

A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...ijcisjournal
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
 
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...ijcisjournal
 
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...ijcisjournal
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features ijcisjournal
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...ijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanicalijcisjournal
 
Penetration testing in agile software
Penetration testing in agile softwarePenetration testing in agile software
Penetration testing in agile softwareijcisjournal
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
 
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...ijcisjournal
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONijcisjournal
 
An efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data miningAn efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data miningijcisjournal
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...ijcisjournal
 
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...ijcisjournal
 
Blind Image Quality Assessment with Local Contrast Features
Blind Image Quality Assessment with Local Contrast Features Blind Image Quality Assessment with Local Contrast Features
Blind Image Quality Assessment with Local Contrast Features ijcisjournal
 
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...ijcisjournal
 
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC ijcisjournal
 
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme ijcisjournal
 

Viewers also liked (19)

A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
 
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...
 
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
 
Penetration testing in agile software
Penetration testing in agile softwarePenetration testing in agile software
Penetration testing in agile software
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
 
An efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data miningAn efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data mining
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
 
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...
 
Blind Image Quality Assessment with Local Contrast Features
Blind Image Quality Assessment with Local Contrast Features Blind Image Quality Assessment with Local Contrast Features
Blind Image Quality Assessment with Local Contrast Features
 
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...
 
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC
 
5215ijcis01
5215ijcis015215ijcis01
5215ijcis01
 
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
 

Similar to General Kalman Filter & Speech Enhancement for Speaker Identification

A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLABA GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLABsipij
 
Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...
Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...
Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...ijceronline
 
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...sipij
 
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...IJCSEA Journal
 
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition TechniqueA Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition TechniqueCSCJournals
 
Course report-islam-taharimul (1)
Course report-islam-taharimul (1)Course report-islam-taharimul (1)
Course report-islam-taharimul (1)TANVIRAHMED611926
 
Isolated Word Recognition System For Tamil Spoken Language Using Back Propaga...
Isolated Word Recognition System For Tamil Spoken Language Using Back Propaga...Isolated Word Recognition System For Tamil Spoken Language Using Back Propaga...
Isolated Word Recognition System For Tamil Spoken Language Using Back Propaga...CSEIJJournal
 
Speech Enhancement Based on Spectral Subtraction Involving Magnitude and Phas...
Speech Enhancement Based on Spectral Subtraction Involving Magnitude and Phas...Speech Enhancement Based on Spectral Subtraction Involving Magnitude and Phas...
Speech Enhancement Based on Spectral Subtraction Involving Magnitude and Phas...IRJET Journal
 
Fusion Approach for Robust Speaker Identification System
Fusion Approach for Robust Speaker Identification System Fusion Approach for Robust Speaker Identification System
Fusion Approach for Robust Speaker Identification System IJCSIS Research Publications
 
Speaker Identification & Verification Using MFCC & SVM
Speaker Identification & Verification Using MFCC & SVMSpeaker Identification & Verification Using MFCC & SVM
Speaker Identification & Verification Using MFCC & SVMIRJET Journal
 
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALGENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALIJCSEIT Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A_Noise_Reduction_Method_Based_on_LMS_Adaptive_Fil.pdf
A_Noise_Reduction_Method_Based_on_LMS_Adaptive_Fil.pdfA_Noise_Reduction_Method_Based_on_LMS_Adaptive_Fil.pdf
A_Noise_Reduction_Method_Based_on_LMS_Adaptive_Fil.pdfBala Murugan
 
Voice biometric recognition
Voice biometric recognitionVoice biometric recognition
Voice biometric recognitionphyuhsan
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 

Similar to General Kalman Filter & Speech Enhancement for Speaker Identification (20)

A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLABA GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
A GAUSSIAN MIXTURE MODEL BASED SPEECH RECOGNITION SYSTEM USING MATLAB
 
Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...
Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...
Emotion Recognition based on audio signal using GFCC Extraction and BPNN Clas...
 
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...
 
Kalman filter
Kalman filterKalman filter
Kalman filter
 
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
AN ANALYSIS OF SPEECH RECOGNITION PERFORMANCE BASED UPON NETWORK LAYERS AND T...
 
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition TechniqueA Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
 
Course report-islam-taharimul (1)
Course report-islam-taharimul (1)Course report-islam-taharimul (1)
Course report-islam-taharimul (1)
 
Isolated Word Recognition System For Tamil Spoken Language Using Back Propaga...
Isolated Word Recognition System For Tamil Spoken Language Using Back Propaga...Isolated Word Recognition System For Tamil Spoken Language Using Back Propaga...
Isolated Word Recognition System For Tamil Spoken Language Using Back Propaga...
 
Speech Enhancement Based on Spectral Subtraction Involving Magnitude and Phas...
Speech Enhancement Based on Spectral Subtraction Involving Magnitude and Phas...Speech Enhancement Based on Spectral Subtraction Involving Magnitude and Phas...
Speech Enhancement Based on Spectral Subtraction Involving Magnitude and Phas...
 
Fusion Approach for Robust Speaker Identification System
Fusion Approach for Robust Speaker Identification System Fusion Approach for Robust Speaker Identification System
Fusion Approach for Robust Speaker Identification System
 
1801 1805
1801 18051801 1805
1801 1805
 
1801 1805
1801 18051801 1805
1801 1805
 
Speaker Identification & Verification Using MFCC & SVM
Speaker Identification & Verification Using MFCC & SVMSpeaker Identification & Verification Using MFCC & SVM
Speaker Identification & Verification Using MFCC & SVM
 
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALGENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A_Noise_Reduction_Method_Based_on_LMS_Adaptive_Fil.pdf
A_Noise_Reduction_Method_Based_on_LMS_Adaptive_Fil.pdfA_Noise_Reduction_Method_Based_on_LMS_Adaptive_Fil.pdf
A_Noise_Reduction_Method_Based_on_LMS_Adaptive_Fil.pdf
 
N017428692
N017428692N017428692
N017428692
 
Voice biometric recognition
Voice biometric recognitionVoice biometric recognition
Voice biometric recognition
 
[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P
[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P
[IJET-V1I6P21] Authors : Easwari.N , Ponmuthuramalingam.P
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

General Kalman Filter & Speech Enhancement for Speaker Identification

  • 1. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 DOI: 10.5121/ijci.2016.5414 117 GENERAL KALMAN FILTER & SPEECH ENHANCEMENT FOR SPEAKER IDENTIFICATION Vijay Kiran Battula and Appala Naidu Gottapu Department of ECE, JNTUK-UCEV, Vizianagaram, Andhra Pradesh, India ABSTRACT Presence of noise increases the dimension of the information. A noise suppression algorithm is developed with an idea of combining the General Kalman Filter and Estimate Maximization (EM) frame work.This combination is helpful and effective in identifying noise characteristics of an acoustic environment. Recursion between Estimate step and Maximization step enabled the algorithm to deal any model of noise. The same Speech enhancement procedure in applied in the pre-processing stage of a conventional Speaker identification method. Due to the non-stationary nature of noise and speech adaptive algorithms are required. Algorithm is first applied for Speech enhancement problem and then extended to using it in the pre-processing step of the Speaker identification. The present work is compared in terms of significant metrics with existing and popular algorithms and results show that the developed algorithm is dominant over them. KEYWORDS Speech processing, Speech enhancement, Speaker identification, General Kalman filter and EM algorithm 1. INTRODUCTION The two major applications of the speech processing namely speech enhancement and speaker identification are inter related in terms of the core techniques used for performing them. Speech enhancement directly resembles the pre-processing stage of the speaker identification procedure in most of the cases. The work depicts the relation and significance of developing an algorithm to address the core areas of their respective step wise procedure is the area of interest. Speech and noise in a natural environment always finds in a combined form, Speech is every time degraded by the noise. General assumption is to always find an addiction of Gaussian noise to the speech information signal. This noise varies in its characteristics for different acoustic environments. The idea is to develop a robust algorithm to deal a noise of any environment that is degrading speech. Elimination of noise could be even possible through the transducers like microphone used to record the speech information and convert them to the electrical equivalent representation. There are techniques developed based on the number of microphones to be used
  • 2. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 118 to identify the noise components in the signal. The present work is based on Single microphone speech enhancement. Noise in the problem is first modelled as an Auto Regressive process. This performed as in [3]. Estimate Maximization frame work is studied which involves speech enhancement and as well as parameter estimation. General Kalman Filter(GKF) is a time domain algorithm first studied for using it system identification problem like echo cancellation in [4]. In Echo cancellation echo path estimation is performed using GKF. For extending the General Kalman filter to the speech enhancement it has to be given with at least one among the knowledge of two characteristics of speech or noise. EM frame work helps in providing the noise characteristics. The time domain implementation of the Kalman filter is difficult and not dominant. G.Enzner through his studies proposed the effective implementation of Kalman filter in frequency domain [2]. But GKF is time domain implemented version of Kalman filter and hence draws the attention. Speaker Recognition is a part behavioural characteristic of the Biometrics. The two major classifications are Speaker verification and Speaker identification namely. Speaker identification can be either text dependent or text independent. In this paper a text independent speaker identification method is considered with a pre-processing stage of developed algorithm. 2. DEFINITION OF THE PROBLEM AND RELATED CONCEPTS )(nx is a noisy speech signal, )(ns and )(nv are its two components. )()()( nvnsnx += Clean speech signal is represented with )(ns and it obtained by supressing additive noise )(nv in )(nx . 2.1. Aim Single microphone is used to record the degraded speech. The developed algorithm is aimed to use in studying then noise characteristics and suppression of the noise components from the signal. Thus to provide the speech quality enhancement and intelligibility. 2.2. General Kalman Filter In [4] General Kalman filter is implemented with two estimation problems. The first is a hidden Markov modelled impulse response coefficient estimation and the second is the estimation of desired response with knowledge of the above estimated coefficients and far end signal. In this work the problem is redefined to fit for a speech enhancement problem. The similar coefficient estimation is equivalent to the change affecting the noise characteristics of the acoustic environment under consideration. And these are updated for find new noise model from previous effects as recursive process by applying estimate maximization frame work.
  • 3. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 119 2.3. Estimate Maximization frame work There are two steps in this process namely estimation step and maximization step. It is a recursive procedure. And the ending if the recursion is predefined or left to the intelligibility of the algorithm. General Kalman filter provides estimation of the required entity in estimation step. These parameters involved in the estimation are identified and updated in the maximization or parameter estimation step and again fed to estimation step. This repeats as an iterative process until the clean entity of interest is obtained. 2.4. Proposed Methods The Figure 1 represent the block diagram of combined speech enhancement for speaker identification, the first half of the diagram illustrates the process flow of speech enhancement as follows i. Noise degraded speech information is collected through single microphone. ii. This is given to the speech enhancement stage. iii. The first step of speech enhancement contains the segmentation of speech signal satisfying the stationary condition of the signal. iv. Thus frames are extracted from the source information and each frame is now forwarded for noise suppression individually. v. The AR model of the noise of the acoustic environment is acquired prior to the above steps and state space formulation is done to it. vi. The estimation process starts by giving noise estimate and present speech frame to General Kalman filter to find optimum output. vii. The parameters are updated in maximization step and again given to GKF for new estimation viii. This Process continues until clean speech frame is obtained for a fixed number of iterations. ix. Finally all the frames are concatenated to obtain clean speech.
  • 4. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 120 Figure1. Proposed Speech Enhancement for Speaker identification Figure 1 represents the proposed method for Speaker identification i. The initial stage of speaker identifications always be the speech enhancement stage. The output of the Speech enhancement stage is a clean speech. ii. Training phase and Verification are two stages of identification. In training phase speech features of the concerned group are collected and stored in data base. iii. In verification stage they are retrieved to compare with the features of persons speech waiting for authentication. iv. If the matching criteria satisfies authentication is provided otherwise rejected. v. In this paper Eigen features based speech features are extracted in feature extraction stage. MFCC range of frequencies is under consideration. vi. Dimensionality reduction techniques like principal component analysis (PCA) and Independent Component analysis (ICA) used for reducing the feature space. vii. Genetic Algorithm is used for verification procedure to provide optimum results and the cost function of it is defined below. ( ) ( ) 21 1 11 2 ),(max)(max ∑ ∑∑ − = +== + L m L nm L m nmPmR λ (1) R=Auto correlation (Correlation between each speech feature itself), P=Cross Correlation (Correlation between speech feature with other speech feature),L=Length of each speech feature,Weighing factorλ
  • 5. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 121 3. ALGORITHM 3.1. Auto Regressive modelling of noise Let us consider the problem in a discrete time index of n, )()()( nvnsnx += (2) Noise and speech are non-stationary. Hence, any one of them has to be known in order to go for formulation. Consider the speech absent periods to study noise characteristics, )()( 0 nvnx = (3) Where )(0 nv is signal collected by recording device when speech is absent and use as initial signal vector of noise. Noise is modelled as stochastic AR process: ∑= +−−= k q v v q nu g knvnv 1 )( 2 )()( λ (4) 1λ , 2λ ,… kλ represents AR parameters of noise process and vg represents power level. )(nuv is normalized (zero-mean unit variance),white Gaussian noise. 3.2. E-step AR model of noise process is converted into state space formulation )](),......,2(),1([)( nvknvknvnv T k +−+−=                     −−−−−− =Φ −−− 12321 ............ .................. . . . . . . ............ . . . . . . . . . . . . 00............010.0 00............0010 λλλλλλ kkkk v is noise transition matrix and k- dimensional vectors [ ]v T v gg .......00= .The below equation provides estimate of noise
  • 6. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 122 )()()1()( nungnvnv vvkvk +−Φ= (5) )()()()( nvnhnsnx k T v+= (6) )()()()( nvnhnxns k T v−= (7) 3.3. M-step Parameters for estimate and AR model, GKF algorithm procedural steps results in finding the minimal error and optimal estimate. The following are the related equations Initialize with 0)(ˆ =nhv and qIR εµ =)0( where ε is small positive constant )()1(ˆ)(ˆ nwnhnh vv +−= (8) )()()()( nvnhnsnx k T v+= (9) )(ˆ)()( nvnxne −= (10) qwm InnRnR )()1()( 2 σµ +−= (11) pvkm T ke InnvnRnvnR )()()()()( 2 σ+= (12) )()()()( 1 nRnvnRnK ekm − = (13) )1(ˆ)()()( −−= nhnvnxne v T k (14) )()()1(ˆ)(ˆ nenKnhnh vv +−= (15) )()]()([)( nRnvnKInR m T kq −=µ (16) Where )(nRm is priori misalignment, )(nRµ is posteriori misalignment correlation matrix, )(nK is Kalman gain, qI is identity matrix, )(2 nwσ is variance of )(nw , )(nRe is priori error vector correlation matrix and )(ne is error between signal and estimated. Let θ be the vector of unknown parameters and given as vector [ ]v TT gλθ =
  • 7. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 123 )1()1( −−= nvnvZ T qq (17) )()1( nvnvY q −= (18) Where updated parameters are defined as ∑ ∑−=+ YZEq ][ˆ )1( λ (19) ( )∑     += ++ ][ˆˆ )1()1( YEZg Tqq v λ . (20) 4. RESULTS 4.1. Simulation and Metrics NOIZEUS speech corpus contains noisy speech signals. These are directly used to test the performance of the proposed algorithm. The similar experiments are conducted with popular algorithms and are used for comparison. Peak signal to Noise ratio and Mean square error are used to evaluate performance for Speech enhancement. Identification rate and elapsed time for a fixed number of generations are compared for Speaker identification. Simulations are performed in MATLAB platform and respective analysis is presented below. Figure 2. Noisy and GKF enhanced babble noise type of SNR 0dB, 5dB, 15dB
  • 8. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 124 Figure 3.PSNR and MSE comparison of SS, NLMS, RLS, APA and GKF (Speech Enhancement)
  • 9. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 125 Figure 4. Identification rate comparison of different processing method combinations (Speaker Identification) 5. CONCLUSIONS General Kalman filter resembles Affine projection algorithm (APA) for certain considerations but the combination with Estimate Maximization is more efficient for GKF. Figure 2 presents the MATLAB simulated results of babble noise type of various SNR levels. Figure 3 is the analysis of proposed algorithm, Normalized least mean square algorithm, Recursive least squares, APA and Spectral subtraction for Speech enhancement applications. Proposed algorithm has given better results in terms of Mean square error and Peak signal to noise ratio. Figure 4 clearly shows the dimensionality reduction effect on the speaker identification system with change in filtration scheme. The respective identification rates and elapsed time of different methods and combination under considerations presented in figure 4 shows GKF is optimum. This work could be further extended to real time and then performance has to analyzed to know its compatibility. REFERENCES [1] R. E. Kalman, “A new approach to linear filtering and prediction problems,”J. Basic Eng., vol.82, pp. 35–45, Mar. 1960. [2] G. Enzner and P. Vary, “Frequency-domain adaptive Kalman filter foracoustic echo control in hands- free telephones,” Signal Process., vol.86, pp. 1140–1156, 2006. [3] Jae Lim; A. Oppenheim, “All-pole modeling of degraded speech,” IEEE Transactions on Acoustics, Speech, and Signal ProcessingYear: 1978, Volume: 26, Issue: 3 [4] C. Paleologu, J. Benesty, and S. Ciochina, “Study of the general Kalman ˘filter for echo cancellation,” IEEE Trans. Audio, Speech, LanguageProcessing, vol. 21, pp. 1539–1549, Aug. 2013.
  • 10. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 126 [5] S. E. Bou-Ghazale and K. Assaleh, “A robust endpoint detection of speech for noisy environments with application to automatic speech recognition,” in Proc. ICASSP2002, vol. 4, pp. 3808–3811, 2002. [6] S. Gannot, “Speech processing utilizing the Kalman filter,” IEEE Instrum. Meas. Mag., vol. 15, no. 3, pp. 10–14, Jun. 2012. [7] T. Kishore Kumar, Siva Prasad Nandyala, Ravi Bolimera,” Speech Enhancement using Spectral Subtraction,Affine Projection Algorithms and Classical AdaptiveFilters ,” International Conference On Advances In Electronics, Electrical And Computer Science Engineering - EEC 2012 [8] Sadaoki Furui, “50 Years of Progress in Speech and Speaker Recognition Research,” Ecti Transactions on computer and Information Technology, Vol.1, No.2, November 2005 [9] Omar Daoud, Abdel-Rahman Al-Qawasmi and Khaled daqrouq, “Modified PCA Speaker Identification Based System Using Wavelet Transform and Neural Networks,” International Journal of Recent Trends in Engineering, Vol 2, No. 5, November 2009. [10] Reynolds, D.A., “Experimental evaluation of features for robust speaker identification,” IEEE Transactions on SAP, Vol. 2, pp. 639-643, 2008. [11] K. Koteswara rao, G. Appala Naidu, “Eigen features based speaker identification model using Genetic algorithm,” VSPICE-2k15 National conference, JNTU KAKINADA AUTHORS B.Vijay Kiran received B.Tech degree from JNTUK and currently pursuing M.Tech degree in UCEV Vizianagaram, JNT University Kakinada and Vizianagaram. G. Appala Naidu received both B.Tech and M.Tech degrees from JNTUH. He is currently working in University College of Engineering Vizianagaram, JNT University Kakinada, and Vizianagaram.