{"title":"Arabic Text-Dependent Speaker Verification for Mobile Devices Using Artificial Neural Networks","authors":"A. Alarifi, Issa Alkurtass, A. Al-Salman","doi":"10.1109/ICMLA.2011.168","DOIUrl":null,"url":null,"abstract":"Speaker verification is one of the biometric verification techniques used to verify the claimed identity of a speaker. It is mainly applied for security reasons and managing users' authentication. Voiceprint can be used as a unique password of the user to prove his/her identity. In this paper, we propose a new Arabic text-dependent speaker verification system for mobile devices using artificial neural networks (ANN) to recognize authorized user and unlock devices for him/her. We describe system components and demonstrate how it works. We present the performance of our system and analyze its results.","PeriodicalId":439926,"journal":{"name":"2011 10th International Conference on Machine Learning and Applications and Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 10th International Conference on Machine Learning and Applications and Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMLA.2011.168","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
Speaker verification is one of the biometric verification techniques used to verify the claimed identity of a speaker. It is mainly applied for security reasons and managing users' authentication. Voiceprint can be used as a unique password of the user to prove his/her identity. In this paper, we propose a new Arabic text-dependent speaker verification system for mobile devices using artificial neural networks (ANN) to recognize authorized user and unlock devices for him/her. We describe system components and demonstrate how it works. We present the performance of our system and analyze its results.