SlideShare a Scribd company logo
SPEAKER RECOGNITION USING MFCC
• Hira Shaukat 2010131
 DSP Lab Project

 Matlab-based programming

• Attiya Rehman 2010079
HUMAN SPEECH
•

The human speech contains numerous
discriminative features that can be used to
identify speakers.

•

Speech contains significant energy from
zero frequency up to around 5 kHz.

•

Objective of automatic speaker recognition
is to extract, characterize and recognize
the information about speaker identity.

•

The property of speech signal changes
markedly as a function of time.
SPEECH DISCERNMENT
•

Speaker recognition systems
contain two main modules:

•
•
•

feature extraction
feature matching

Feature extraction:
Extract a small amount of data
from the voice signal that can
be used to represent each
speaker

•

Feature matching:
Procedure to identify the
unknown
speaker
by
comparing extracted features
from his/her voice input with
the ones from a set of known
speakers
Phase 1

SPEECH FEATURE EXTRACTION
INTRODUCTION
•

Speech signal - slowly timed
varying signal (it is called quasistationary)

•

Signal-processing front end
Conversion of speech
waveform, using digital signal
processing (DSP) tools, to a set of
features (at a considerably lower
information rate) for further
analysis

•

Short-time spectral analysis
Characterization of the speech
signal
CHOICE OF METHODOLOGY
•

Linear Predictive Coding (LPC)

•

Mel-Frequency Cepstrum
Coefficients (MFCC)

•

Perceptual Linear Predictive
Analysis (PLP)
BASIC METHODOLOGY

MFCC – MEL FREQUENCY CEPSTRUM COEFFICIENT
MEL FREQUENCY CEPSTRUM CO-EFFICIENT (MFCC)
Main purpose of the MFCC processor is to mimic the behavior of the human ears
MFFC‟s - less susceptible to variations
Speech input typically recorded at a sampling rate above 10000 Hz
This sampling frequency chosen to minimize the effects of aliasing in the analog-to-digital
conversion
• Sampled signals can capture all frequencies up to 5 kHz, which cover most energy of
sounds that are generated by humans
•
•
•
•
FRAME BLOCKING
•

In this step the continuous speech signal is
blocked into frames of N samples, with
adjacent frames being separated by M (M <
N)

•

The first frame consists of the first N samples

•

The second frame begins M samples after
the first frame, and overlaps it by N - M
samples

•

Process continues until all the speech is
accounted for within one or more frames

•

Taken values for N and M are N = 256 and M
= 100

•

The result after this step is referred to as
spectrum or periodogram.
MEL-FREQUENCY WRAPPING
•

For each tone with an actual frequency, f, a
subjective pitch is measured on a scale called the
„mel‟ scale.

•

Mel-frequency scale is a linear frequency spacing
below 1000 Hz and a logarithmic spacing above
1000 Hz

•

One approach to simulating the subjective
spectrum is to use a filter bank, spaced uniformly
on the mel-scale
MEL-FREQUENCY WRAPPING
•

That filter bank has a triangular bandpass
frequency response, and the spacing as well as
the bandwidth is determined by a constant mel
frequency interval

•

The number of mel spectrum coefficients, K, is
typically chosen as 20.

•

Filter bank is applied in the frequency domain
CEPSTRUM
•

In this final step, we convert the log mel spectrum back to time

•

Result - mel frequency cepstrum coefficients (MFCC)

•

Cepstral representation of speech spectrum provides good representation of the local
spectral properties of the signal for the given frame analysis

•

Mel spectrum coefficients (and so their logarithm) are real numbers
can be converted to the time domain using the Discrete Cosine Transform (DCT)

•

We exclude the first component, from the DCT since it represents the mean value of the
input signal, which carries little speaker specific information
Phase 2

SPEECH FEATURE MATCHING
FEATURE MATCHING
•

Comes under pattern recognition (The objects of interest are generically called patterns)

•

Patterns - sequences of acoustic vectors that are extracted from an input speech using
extraction

•

Test Set - Patterns used to test the classification algorithm

•

Feature matching techniques used in speaker recognition - Dynamic Time Warping
(DTW), Hidden Markov Modeling (HMM), and Vector Quantization (VQ)

•

VQ approach used due to:
• ease of implementation
• high accuracy
VQ is a process of mapping vectors from a large vector space to a finite number of
regions in that space.

•
•

Each region is called a cluster and can be represented by its center called a codeword.
The collection of all codewords is called a codebook.
VECTOR QUANTIZATION CODE-BOOK FORMATION
•

•
•
•

Two speakers and two dimensions
of the acoustic space
Circles - acoustic vectors from the
speaker 1
Triangles - acoustic vectors from
speaker 2
Training phase
• using the clustering algorithm
a
speaker-specific
VQ
codebook is generated for
each known speaker by
clustering his/her training
acoustic vectors
• Result codewords (centroids) black circles and black
triangles for speaker 1 and 2
VECTOR QUANTIZATION CODE-BOOK FORMATION
•
•

•

Distance from a vector to the
closest codeword of a codebook is
called VQ-distortion
Input utterance of an unknown
voice is “vector-quantized” using
each trained codebook and the
total VQ distortion is computed
The speaker corresponding to the
VQ codebook with smallest total
distortion is identified as the
speaker of the input utterance.
CLUSTERING THE TRAINING VECTORS
Phase 3

MATLAB CODING
L.R. Rabiner and B.H. Juang, Fundamentals of Speech
Recognition, Prentice-Hall, Englewood Cliffs, N.J., 1993.



L.R Rabiner and R.W. Schafer, Digital Processing of Speech
Signals, Prentice-Hall, Englewood Cliffs, N.J., 1978.



REFERENCES



S.B. Davis and P. Mermelstein, “Comparison of parametric
representations for monosyllabic word recognition in continuously spoken
sentences”, IEEE Transactions on Acoustics, Speech, Signal
Processing, Vol. ASSP-28, No. 4, August 1980.



Y. Linde, A. Buzo & R. Gray, “An algorithm for vector quantizer
design”, IEEE Transactions on Communications, Vol. 28, pp.84-95, 1980.



S. Furui, “Speaker independent isolated word recognition using
dynamic features of speech spectrum”, IEEE Transactions on
Acoustic, Speech, Signal Processing, Vol. ASSP-34, No. 1, pp. 5259, February 1986.
S. Furui, “An overview of speaker recognition technology”, ESCA
Workshop on Automatic Speaker Recognition, Identification and
Verification, pp. 1-9, 1994.





F.K. Song, A.E. Rosenberg and B.H. Juang, “A vector
quantisation approach to speaker recognition”, AT&T Technical
Journal, Vol. 66-2, pp. 14-26, March 1987.



comp.speech Frequently Asked Questions WWW site,


http://svr-www.eng.cam.ac.uk/comp.speech/

More Related Content

What's hot

Text independent speaker recognition system
Text independent speaker recognition systemText independent speaker recognition system
Text independent speaker recognition system
Deepesh Lekhak
 
Speech Recognition
Speech Recognition Speech Recognition
Speech Recognition
Goa App
 
Automatic Speech Recognition
Automatic Speech RecognitionAutomatic Speech Recognition
Automatic Speech Recognition
International Islamic University
 
Speech recognition an overview
Speech recognition   an overviewSpeech recognition   an overview
Speech recognition an overview
Varun Jain
 
Speech recognition system seminar
Speech recognition system seminarSpeech recognition system seminar
Speech recognition system seminarDiptimaya Sarangi
 
speech processing basics
speech processing basicsspeech processing basics
speech processing basics
sivakumar m
 
Speech Recognition
Speech RecognitionSpeech Recognition
Speech Recognition
Ahmed Moawad
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice RecognitionAmrita More
 
Deep Learning for Speech Recognition - Vikrant Singh Tomar
Deep Learning for Speech Recognition - Vikrant Singh TomarDeep Learning for Speech Recognition - Vikrant Singh Tomar
Deep Learning for Speech Recognition - Vikrant Singh Tomar
WithTheBest
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition Technology
Aamir-sheriff
 
Unit 1 speech processing
Unit 1 speech processingUnit 1 speech processing
Unit 1 speech processing
azhagujaisudhan
 
Speech signal processing lizy
Speech signal processing lizySpeech signal processing lizy
Speech signal processing lizy
Lizy Abraham
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition Technology
Seminar Links
 
Introduction to text to speech
Introduction to text to speechIntroduction to text to speech
Introduction to text to speech
Bilgin Aksoy
 
Speech synthesis technology
Speech synthesis technologySpeech synthesis technology
Speech synthesis technology
Kalluri Madhuri
 
Emotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio SpeechEmotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio Speech
IOSR Journals
 
Automatic speech recognition
Automatic speech recognitionAutomatic speech recognition
Automatic speech recognition
Richie
 

What's hot (20)

Speech processing
Speech processingSpeech processing
Speech processing
 
Text independent speaker recognition system
Text independent speaker recognition systemText independent speaker recognition system
Text independent speaker recognition system
 
Speech Recognition
Speech Recognition Speech Recognition
Speech Recognition
 
Automatic Speech Recognition
Automatic Speech RecognitionAutomatic Speech Recognition
Automatic Speech Recognition
 
Speech recognition an overview
Speech recognition   an overviewSpeech recognition   an overview
Speech recognition an overview
 
Speech recognition system seminar
Speech recognition system seminarSpeech recognition system seminar
Speech recognition system seminar
 
speech processing basics
speech processing basicsspeech processing basics
speech processing basics
 
Speech Recognition
Speech RecognitionSpeech Recognition
Speech Recognition
 
Voice Recognition
Voice RecognitionVoice Recognition
Voice Recognition
 
Deep Learning for Speech Recognition - Vikrant Singh Tomar
Deep Learning for Speech Recognition - Vikrant Singh TomarDeep Learning for Speech Recognition - Vikrant Singh Tomar
Deep Learning for Speech Recognition - Vikrant Singh Tomar
 
Speaker recognition.
Speaker recognition.Speaker recognition.
Speaker recognition.
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition Technology
 
Unit 1 speech processing
Unit 1 speech processingUnit 1 speech processing
Unit 1 speech processing
 
Speech signal processing lizy
Speech signal processing lizySpeech signal processing lizy
Speech signal processing lizy
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition Technology
 
Introduction to text to speech
Introduction to text to speechIntroduction to text to speech
Introduction to text to speech
 
SPEAKER VERIFICATION
SPEAKER VERIFICATIONSPEAKER VERIFICATION
SPEAKER VERIFICATION
 
Speech synthesis technology
Speech synthesis technologySpeech synthesis technology
Speech synthesis technology
 
Emotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio SpeechEmotion Recognition Based On Audio Speech
Emotion Recognition Based On Audio Speech
 
Automatic speech recognition
Automatic speech recognitionAutomatic speech recognition
Automatic speech recognition
 

Similar to Speaker recognition using MFCC

44 i9 advanced-speaker-recognition
44 i9 advanced-speaker-recognition44 i9 advanced-speaker-recognition
44 i9 advanced-speaker-recognitionsunnysyed
 
Toward wave net speech synthesis
Toward wave net speech synthesisToward wave net speech synthesis
Toward wave net speech synthesis
NAVER Engineering
 
Harmonic speech coding
Harmonic speech codingHarmonic speech coding
Harmonic speech coding
MuthanaALJANABI
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMA
Bidhan Ghimire
 
Speaker identification using mel frequency
Speaker identification using mel frequency Speaker identification using mel frequency
Speaker identification using mel frequency
Phan Duy
 
Voice biometric recognition
Voice biometric recognitionVoice biometric recognition
Voice biometric recognition
phyuhsan
 
Speech recognition final
Speech recognition finalSpeech recognition final
Speech recognition final
Archit Vora
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
ijsrd.com
 
Sampling
SamplingSampling
Speaker Dependent WaveNet Vocoder
Speaker Dependent WaveNet VocoderSpeaker Dependent WaveNet Vocoder
Speaker Dependent WaveNet Vocoder
Akira Tamamori
 
Speech Signal Processing
Speech Signal ProcessingSpeech Signal Processing
Speech Signal Processing
Murtadha Alsabbagh
 
Linear Predictive Coding
Linear Predictive CodingLinear Predictive Coding
Linear Predictive Coding
Srishti Kakade
 
unit 5 ADC.pptx
unit 5 ADC.pptxunit 5 ADC.pptx
unit 5 ADC.pptx
phdresearchmail2018
 
Design and Implementation of Speech Based Scientific Calculator
Design and Implementation of Speech Based Scientific CalculatorDesign and Implementation of Speech Based Scientific Calculator
Design and Implementation of Speech Based Scientific Calculator
Shantha Suresh M
 
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition TechniqueA Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
CSCJournals
 
Wireless SS.pptx
Wireless                                        SS.pptxWireless                                        SS.pptx
Wireless SS.pptx
Desalechali1
 
Speech Compression using LPC
Speech Compression using LPCSpeech Compression using LPC
Speech Compression using LPCDisha Modi
 
Speaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home ApplicationsSpeaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home Applications
Roger Gomes
 

Similar to Speaker recognition using MFCC (20)

44 i9 advanced-speaker-recognition
44 i9 advanced-speaker-recognition44 i9 advanced-speaker-recognition
44 i9 advanced-speaker-recognition
 
Toward wave net speech synthesis
Toward wave net speech synthesisToward wave net speech synthesis
Toward wave net speech synthesis
 
Harmonic speech coding
Harmonic speech codingHarmonic speech coding
Harmonic speech coding
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMA
 
Speaker identification using mel frequency
Speaker identification using mel frequency Speaker identification using mel frequency
Speaker identification using mel frequency
 
P141omfccu
P141omfccuP141omfccu
P141omfccu
 
Voice biometric recognition
Voice biometric recognitionVoice biometric recognition
Voice biometric recognition
 
Speech recognition final
Speech recognition finalSpeech recognition final
Speech recognition final
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
 
Sampling
SamplingSampling
Sampling
 
Speaker Dependent WaveNet Vocoder
Speaker Dependent WaveNet VocoderSpeaker Dependent WaveNet Vocoder
Speaker Dependent WaveNet Vocoder
 
Speech Signal Processing
Speech Signal ProcessingSpeech Signal Processing
Speech Signal Processing
 
Linear Predictive Coding
Linear Predictive CodingLinear Predictive Coding
Linear Predictive Coding
 
unit 5 ADC.pptx
unit 5 ADC.pptxunit 5 ADC.pptx
unit 5 ADC.pptx
 
Design and Implementation of Speech Based Scientific Calculator
Design and Implementation of Speech Based Scientific CalculatorDesign and Implementation of Speech Based Scientific Calculator
Design and Implementation of Speech Based Scientific Calculator
 
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition TechniqueA Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
A Novel, Robust, Hierarchical, Text-Independent Speaker Recognition Technique
 
Wireless SS.pptx
Wireless                                        SS.pptxWireless                                        SS.pptx
Wireless SS.pptx
 
Speech Compression using LPC
Speech Compression using LPCSpeech Compression using LPC
Speech Compression using LPC
 
Speaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home ApplicationsSpeaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home Applications
 
lpc and horn noise detection
lpc and horn noise detectionlpc and horn noise detection
lpc and horn noise detection
 

More from Hira Shaukat

Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
Development of Islamabad through SME
Development of Islamabad through SME Development of Islamabad through SME
Development of Islamabad through SME Hira Shaukat
 
Future Cooperative Networks
Future Cooperative NetworksFuture Cooperative Networks
Future Cooperative NetworksHira Shaukat
 
Spread spectrum communication schemes
Spread spectrum communication schemesSpread spectrum communication schemes
Spread spectrum communication schemesHira Shaukat
 
Home automation system
Home automation system Home automation system
Home automation system Hira Shaukat
 
Cruise control simulation using matlab
Cruise control simulation using matlabCruise control simulation using matlab
Cruise control simulation using matlab
Hira Shaukat
 

More from Hira Shaukat (8)

4 bit counter
4 bit counter4 bit counter
4 bit counter
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Development of Islamabad through SME
Development of Islamabad through SME Development of Islamabad through SME
Development of Islamabad through SME
 
Future Cooperative Networks
Future Cooperative NetworksFuture Cooperative Networks
Future Cooperative Networks
 
Spread spectrum communication schemes
Spread spectrum communication schemesSpread spectrum communication schemes
Spread spectrum communication schemes
 
3 d printer
3 d printer3 d printer
3 d printer
 
Home automation system
Home automation system Home automation system
Home automation system
 
Cruise control simulation using matlab
Cruise control simulation using matlabCruise control simulation using matlab
Cruise control simulation using matlab
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Speaker recognition using MFCC

  • 1. SPEAKER RECOGNITION USING MFCC • Hira Shaukat 2010131  DSP Lab Project  Matlab-based programming • Attiya Rehman 2010079
  • 2. HUMAN SPEECH • The human speech contains numerous discriminative features that can be used to identify speakers. • Speech contains significant energy from zero frequency up to around 5 kHz. • Objective of automatic speaker recognition is to extract, characterize and recognize the information about speaker identity. • The property of speech signal changes markedly as a function of time.
  • 3. SPEECH DISCERNMENT • Speaker recognition systems contain two main modules: • • • feature extraction feature matching Feature extraction: Extract a small amount of data from the voice signal that can be used to represent each speaker • Feature matching: Procedure to identify the unknown speaker by comparing extracted features from his/her voice input with the ones from a set of known speakers
  • 5. INTRODUCTION • Speech signal - slowly timed varying signal (it is called quasistationary) • Signal-processing front end Conversion of speech waveform, using digital signal processing (DSP) tools, to a set of features (at a considerably lower information rate) for further analysis • Short-time spectral analysis Characterization of the speech signal
  • 6. CHOICE OF METHODOLOGY • Linear Predictive Coding (LPC) • Mel-Frequency Cepstrum Coefficients (MFCC) • Perceptual Linear Predictive Analysis (PLP)
  • 7. BASIC METHODOLOGY MFCC – MEL FREQUENCY CEPSTRUM COEFFICIENT
  • 8. MEL FREQUENCY CEPSTRUM CO-EFFICIENT (MFCC) Main purpose of the MFCC processor is to mimic the behavior of the human ears MFFC‟s - less susceptible to variations Speech input typically recorded at a sampling rate above 10000 Hz This sampling frequency chosen to minimize the effects of aliasing in the analog-to-digital conversion • Sampled signals can capture all frequencies up to 5 kHz, which cover most energy of sounds that are generated by humans • • • •
  • 9. FRAME BLOCKING • In this step the continuous speech signal is blocked into frames of N samples, with adjacent frames being separated by M (M < N) • The first frame consists of the first N samples • The second frame begins M samples after the first frame, and overlaps it by N - M samples • Process continues until all the speech is accounted for within one or more frames • Taken values for N and M are N = 256 and M = 100 • The result after this step is referred to as spectrum or periodogram.
  • 10. MEL-FREQUENCY WRAPPING • For each tone with an actual frequency, f, a subjective pitch is measured on a scale called the „mel‟ scale. • Mel-frequency scale is a linear frequency spacing below 1000 Hz and a logarithmic spacing above 1000 Hz • One approach to simulating the subjective spectrum is to use a filter bank, spaced uniformly on the mel-scale
  • 11. MEL-FREQUENCY WRAPPING • That filter bank has a triangular bandpass frequency response, and the spacing as well as the bandwidth is determined by a constant mel frequency interval • The number of mel spectrum coefficients, K, is typically chosen as 20. • Filter bank is applied in the frequency domain
  • 12. CEPSTRUM • In this final step, we convert the log mel spectrum back to time • Result - mel frequency cepstrum coefficients (MFCC) • Cepstral representation of speech spectrum provides good representation of the local spectral properties of the signal for the given frame analysis • Mel spectrum coefficients (and so their logarithm) are real numbers can be converted to the time domain using the Discrete Cosine Transform (DCT) • We exclude the first component, from the DCT since it represents the mean value of the input signal, which carries little speaker specific information
  • 14. FEATURE MATCHING • Comes under pattern recognition (The objects of interest are generically called patterns) • Patterns - sequences of acoustic vectors that are extracted from an input speech using extraction • Test Set - Patterns used to test the classification algorithm • Feature matching techniques used in speaker recognition - Dynamic Time Warping (DTW), Hidden Markov Modeling (HMM), and Vector Quantization (VQ) • VQ approach used due to: • ease of implementation • high accuracy VQ is a process of mapping vectors from a large vector space to a finite number of regions in that space. • • Each region is called a cluster and can be represented by its center called a codeword. The collection of all codewords is called a codebook.
  • 15. VECTOR QUANTIZATION CODE-BOOK FORMATION • • • • Two speakers and two dimensions of the acoustic space Circles - acoustic vectors from the speaker 1 Triangles - acoustic vectors from speaker 2 Training phase • using the clustering algorithm a speaker-specific VQ codebook is generated for each known speaker by clustering his/her training acoustic vectors • Result codewords (centroids) black circles and black triangles for speaker 1 and 2
  • 16. VECTOR QUANTIZATION CODE-BOOK FORMATION • • • Distance from a vector to the closest codeword of a codebook is called VQ-distortion Input utterance of an unknown voice is “vector-quantized” using each trained codebook and the total VQ distortion is computed The speaker corresponding to the VQ codebook with smallest total distortion is identified as the speaker of the input utterance.
  • 19. L.R. Rabiner and B.H. Juang, Fundamentals of Speech Recognition, Prentice-Hall, Englewood Cliffs, N.J., 1993.  L.R Rabiner and R.W. Schafer, Digital Processing of Speech Signals, Prentice-Hall, Englewood Cliffs, N.J., 1978.  REFERENCES  S.B. Davis and P. Mermelstein, “Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences”, IEEE Transactions on Acoustics, Speech, Signal Processing, Vol. ASSP-28, No. 4, August 1980.  Y. Linde, A. Buzo & R. Gray, “An algorithm for vector quantizer design”, IEEE Transactions on Communications, Vol. 28, pp.84-95, 1980.  S. Furui, “Speaker independent isolated word recognition using dynamic features of speech spectrum”, IEEE Transactions on Acoustic, Speech, Signal Processing, Vol. ASSP-34, No. 1, pp. 5259, February 1986. S. Furui, “An overview of speaker recognition technology”, ESCA Workshop on Automatic Speaker Recognition, Identification and Verification, pp. 1-9, 1994.   F.K. Song, A.E. Rosenberg and B.H. Juang, “A vector quantisation approach to speaker recognition”, AT&T Technical Journal, Vol. 66-2, pp. 14-26, March 1987.  comp.speech Frequently Asked Questions WWW site,  http://svr-www.eng.cam.ac.uk/comp.speech/

Editor's Notes

  1. An example of speech signal is shown in Figure 2. When examined over a sufficiently short period of time (between 5 and 100 msec), its characteristics are fairly stationary. However, over long periods of time (on the order of 1/5 seconds or more) the signal characteristic change to reflect the different speech sounds being spoken. Therefore, short-time spectral analysis is the most common way to characterize the speech signal.
  2. An example of speech signal is shown in Figure 2. When examined over a sufficiently short period of time (between 5 and 100 msec), its characteristics are fairly stationary. However, over long periods of time (on the order of 1/5 seconds or more) the signal characteristic change to reflect the different speech sounds being spoken. Therefore, short-time spectral analysis is the most common way to characterize the speech signal.
  3. MFCC’s are based on the known variation of the human ear’s critical bandwidths with frequency, filters spaced linearly at low frequencies and logarithmically at high frequencies have been used to capture the phonetically important characteristics of speech. This is expressed in the mel-frequency scale, which is a linear frequency spacing below 1000 Hz and a logarithmic spacing above 1000 Hz. The process of computing MFCCs is described in more detail next.
  4. As mentioned above, psychophysical studies have shown that human perception of the frequency contents of sounds for speech signals does not follow a linear scale. A useful way of thinking about this mel-wrapping filter bank is to view each filter as a histogram bin (where bins have overlap) in the frequency domain.
  5. As mentioned above, psychophysical studies have shown that human perception of the frequency contents of sounds for speech signals does not follow a linear scale. A useful way of thinking about this mel-wrapping filter bank is to view each filter as a histogram bin (where bins have overlap) in the frequency domain.