Chi-Shi Liu, D. H. Liu, So-Lin Yen, Jung-Hsiang Liao, Chun-Hsi Shih, Bor-Shenn Jeng
{"title":"中华民国中华广播电台及中华民国MJIB之说话人验证研究结果","authors":"Chi-Shi Liu, D. H. Liu, So-Lin Yen, Jung-Hsiang Liao, Chun-Hsi Shih, Bor-Shenn Jeng","doi":"10.1109/CCST.1997.626237","DOIUrl":null,"url":null,"abstract":"In this paper, we will present some study results from the cooperation of these two units and propose several useful methods to improve the performance of speaker verification. These methods are the discriminative training algorithm, the scoring function and the acoustic segment based probabilistic model. A 100-speaker digit database collected through the public switching telephone network is used for a series of experiments. Besides mentioning the advantages of each proposed method, a series of experiments and analytic steps are also given.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Some study results of speaker verification from Chung-Hwa TL and MJIB of ROC\",\"authors\":\"Chi-Shi Liu, D. H. Liu, So-Lin Yen, Jung-Hsiang Liao, Chun-Hsi Shih, Bor-Shenn Jeng\",\"doi\":\"10.1109/CCST.1997.626237\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we will present some study results from the cooperation of these two units and propose several useful methods to improve the performance of speaker verification. These methods are the discriminative training algorithm, the scoring function and the acoustic segment based probabilistic model. A 100-speaker digit database collected through the public switching telephone network is used for a series of experiments. Besides mentioning the advantages of each proposed method, a series of experiments and analytic steps are also given.\",\"PeriodicalId\":188436,\"journal\":{\"name\":\"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1997-10-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1997.626237\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1997.626237","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Some study results of speaker verification from Chung-Hwa TL and MJIB of ROC
In this paper, we will present some study results from the cooperation of these two units and propose several useful methods to improve the performance of speaker verification. These methods are the discriminative training algorithm, the scoring function and the acoustic segment based probabilistic model. A 100-speaker digit database collected through the public switching telephone network is used for a series of experiments. Besides mentioning the advantages of each proposed method, a series of experiments and analytic steps are also given.