2D CLAFIC Subspace Technique in Probabilistic Speaker Verification
User-specific subspace method in speaker recognition, such as CLAFIC is used to construct the individual subspace which represents the distinct spectral characteristic for each speaker. It concatenates the speech matrices side by side before forming the correlation matrix. In this paper, we proposed...
| Main Authors: | Chong, L. Y., Teoh, Andrew B.J., Khor, S. E. |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3182/ |
Similar Items
Speaker verification using probabilistic 2D CLAFIC
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
Probabilistic random projections and speaker verification
by: Ying, Chong Lee, et al.
Published: (2007)
by: Ying, Chong Lee, et al.
Published: (2007)
Compatibility of biometric strengthening with probabilistic neural network
by: Shih-Yin, Ooi, et al.
Published: (2008)
by: Shih-Yin, Ooi, et al.
Published: (2008)
Secure Random 2D Subspace Techniques In GMM Based Speaker Verification System
by: Chong, Lee Ying
Published: (2008)
by: Chong, Lee Ying
Published: (2008)
Robust Signal Subspace Speech Classifier
by: Tan, Alan W. C., et al.
Published: (2007)
by: Tan, Alan W. C., et al.
Published: (2007)
Offline Signature Verification through Biometric Strengthening
by: Ooi, Shih-Yin, et al.
Published: (2007)
by: Ooi, Shih-Yin, et al.
Published: (2007)
A composite signal subspace speech classifier
by: TAN, A, et al.
Published: (2007)
by: TAN, A, et al.
Published: (2007)
A face and speech biometric verification system using a simple Bayesian structure
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
Nearest neighbourhood classifiers in a bimodal biometric verification system fusion decision scheme
by: Teoh,, A, et al.
Published: (2004)
by: Teoh,, A, et al.
Published: (2004)
Dynamic Handwritten Signature Verification Based on Statistical Quantization Mechanism
by: Ong, Thian Song, et al.
Published: (2009)
by: Ong, Thian Song, et al.
Published: (2009)
A signal subspace approach for speech modelling and classification
by: TAN, A, et al.
Published: (2007)
by: TAN, A, et al.
Published: (2007)
SVD-BASED SIGNATURE VERIFICATION TECHNIQUE USING DATA GLOVE
by: KAMEL, NIDAL S., et al.
Published: (2008)
by: KAMEL, NIDAL S., et al.
Published: (2008)
Establishing a Probabilistic Model for Cognitive Learning Style
by: Teh, Yoke-Jin, et al.
Published: (2005)
by: Teh, Yoke-Jin, et al.
Published: (2005)
Probabilistic Learner Modeling in Scientific Inquiry Exploratory Learning Environment
by: Ting, , Choo-Yee, et al.
Published: (2005)
by: Ting, , Choo-Yee, et al.
Published: (2005)
Probabilistic ensemble simplified fuzzy ARTMAP for sonar target differentiation
by: Loo, Chu Kiong, et al.
Published: (2006)
by: Loo, Chu Kiong, et al.
Published: (2006)
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
Autonomous and deterministic probabilistic neural network using global k-means
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
by: Chang, Roy Kwang Yang, et al.
Published: (2006)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
Accurate and reliable diagnosis and classification using probabilistic ensemble simplified fuzzy ARTMAP
by: Loo, C.K., et al.
Published: (2005)
by: Loo, C.K., et al.
Published: (2005)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
An efficient fingerprint verification system using integrated wavelet and Fourier–Mellin invariant transform
by: Jin, A
Published: (2004)
by: Jin, A
Published: (2004)
Theoretic evidence k-nearest neighbourhood classifiers in a bimodal biometric verification system
by: Jin, , ATB, et al.
Published: (2003)
by: Jin, , ATB, et al.
Published: (2003)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Fingerprint images segmentation using two stages coarse to fine discrimination technique
by: Ong, Teng Sian, et al.
Published: (2003)
by: Ong, Teng Sian, et al.
Published: (2003)
Glove-Based Approach to Online Signature Verification
by: Kamel, N.S., et al.
Published: (2008)
by: Kamel, N.S., et al.
Published: (2008)
Ad Hoc Wireless Routing With Density Based Probabilistic Algorithm For Mobile Wireless Networks With Non-Uniform Node Distribution
by: Ong , Hean Loong
Published: (2010)
by: Ong , Hean Loong
Published: (2010)
Partial Verification Bias Correction In Diagnostic Accuracy Studies Using Propensity Score-Based Methods
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
by: Wan Mansor, Wan Nor Arifin
Published: (2023)
Performance analysis in a probabilistic re-entrant for an environmental stress testing operation
by: OMAR, M, et al.
Published: (2008)
by: OMAR, M, et al.
Published: (2008)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Remarks on BioHashing based cancelable biometrics in verification system
by: JIN, A, et al.
Published: (2006)
by: JIN, A, et al.
Published: (2006)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Virtual Reality Based Dynamic Signature Verification Using Data glove
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Adaptive Pca-Based Models To
Reconstruct 3d Faces From Single 2d
Images
by: Maghari, Ashraf Y. A.
Published: (2014)
by: Maghari, Ashraf Y. A.
Published: (2014)
Enhancement of Glove-Based Approach to Dynamic Signature Verification by Reducing Number of Sensors
by: Shohel, Sayeed, et al.
Published: (2008)
by: Shohel, Sayeed, et al.
Published: (2008)
Precise Fingerprint Enrolment through Projection Incorporated Subspace Based on Principal Component Analysis (PCA)
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
3D scale space for structure analysis of 2D image series
by: Logeswaran, , R, et al.
Published: (2005)
by: Logeswaran, , R, et al.
Published: (2005)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Similar Items
-
Speaker verification using probabilistic 2D CLAFIC
by: Ying, Chong Lee, et al.
Published: (2007) -
Probabilistic random projections and speaker verification
by: Ying, Chong Lee, et al.
Published: (2007) -
Compatibility of biometric strengthening with probabilistic neural network
by: Shih-Yin, Ooi, et al.
Published: (2008) -
Secure Random 2D Subspace Techniques In GMM Based Speaker Verification System
by: Chong, Lee Ying
Published: (2008) -
Robust Signal Subspace Speech Classifier
by: Tan, Alan W. C., et al.
Published: (2007)