Speaker authentication system using soft computing approaches

Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-L...

Full description

Bibliographic Details
Main Authors: Abdul Rahman, Abdul Wahab, See Ng, Goek, Dickiyanto, Romy
Format: Article
Language:English
Published: Elsevier 2005
Subjects:
Online Access:http://irep.iium.edu.my/38183/
http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf
_version_ 1848781556025393152
author Abdul Rahman, Abdul Wahab
See Ng, Goek
Dickiyanto, Romy
author_facet Abdul Rahman, Abdul Wahab
See Ng, Goek
Dickiyanto, Romy
author_sort Abdul Rahman, Abdul Wahab
building IIUM Repository
collection Online Access
description Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources.
first_indexed 2025-11-14T15:51:26Z
format Article
id iium-38183
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T15:51:26Z
publishDate 2005
publisher Elsevier
recordtype eprints
repository_type Digital Repository
spelling iium-381832014-09-12T02:18:01Z http://irep.iium.edu.my/38183/ Speaker authentication system using soft computing approaches Abdul Rahman, Abdul Wahab See Ng, Goek Dickiyanto, Romy T Technology (General) Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-Layer Perceptron Neural Network and Generic Self-organizing Fuzzy Neural Network to verify the speakers with high accuracy. Based on the experimental results, the two networks are able to verify speakers using two method in extracting hidden features from the recorded voice sources. Elsevier 2005-03-31 Article PeerReviewed application/pdf en http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf Abdul Rahman, Abdul Wahab and See Ng, Goek and Dickiyanto, Romy (2005) Speaker authentication system using soft computing approaches. Neurocomputing, 68. pp. 13-37. ISSN 0925-2312 http://www.sciencedirect.com/science/article/pii/S0925231205000421#
spellingShingle T Technology (General)
Abdul Rahman, Abdul Wahab
See Ng, Goek
Dickiyanto, Romy
Speaker authentication system using soft computing approaches
title Speaker authentication system using soft computing approaches
title_full Speaker authentication system using soft computing approaches
title_fullStr Speaker authentication system using soft computing approaches
title_full_unstemmed Speaker authentication system using soft computing approaches
title_short Speaker authentication system using soft computing approaches
title_sort speaker authentication system using soft computing approaches
topic T Technology (General)
url http://irep.iium.edu.my/38183/
http://irep.iium.edu.my/38183/
http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf