{"title":"Voice as a Key","authors":"R. Tadeusiewicz, G. Demenko","doi":"10.1109/ICBAKE.2009.28","DOIUrl":null,"url":null,"abstract":"Biometric methods numerous advantages are known very well for every computer security specialist and are in general highly valued. One of the most interesting methods used for biometric protection of computer system (and other objects) is speech parameters extraction, analysis and recognition. Problem under consideration is concentrated on methods showing, how to distinguish between voices of particular people and how to do it independent on the text pronounced by recognized person. Methods used for this purpose are complementary ones in comparison with widely used speech recognition goals, where we must understand the merit content of the utterance disregarding individual features of the voices of different speakers taken into account. The paper shows general problems related to biometric speaker identification and gives general outline, how to use voice as a key for guarded systems.","PeriodicalId":137627,"journal":{"name":"2009 International Conference on Biometrics and Kansei Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Biometrics and Kansei Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICBAKE.2009.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Biometric methods numerous advantages are known very well for every computer security specialist and are in general highly valued. One of the most interesting methods used for biometric protection of computer system (and other objects) is speech parameters extraction, analysis and recognition. Problem under consideration is concentrated on methods showing, how to distinguish between voices of particular people and how to do it independent on the text pronounced by recognized person. Methods used for this purpose are complementary ones in comparison with widely used speech recognition goals, where we must understand the merit content of the utterance disregarding individual features of the voices of different speakers taken into account. The paper shows general problems related to biometric speaker identification and gives general outline, how to use voice as a key for guarded systems.