{"title":"语音认证和说话人验证方法综述","authors":"Jayant Gambhir, Vaishali Patil","doi":"10.1109/ICMSS53060.2021.9673603","DOIUrl":null,"url":null,"abstract":"This paper gives a brief review of the techniques available for speech authentication based on edit detection and speaker verification related to application in forensics. Many past research includes the traditional methods like ENF, DFT, STFT based analysis for speech authentication while some advanced emerging trends like SVM, Ensemble learning and Convolution Neural network have been employed for speech authentication in different application. Similarly, for speaker verification, features such as LPC, MFCC, i-vector, x-vector and techniques like Neural Network, Deep learning etc have been researched. This paper summaries the various experimental results and their merits and demerits from the research papers surveyed. This review is expected to guide towards making an unbiased decision in choosing most promising method for authentication of Speaker and Speech data in forensic application.","PeriodicalId":274597,"journal":{"name":"2021 Fourth International Conference on Microelectronics, Signals & Systems (ICMSS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review On Speech Authentication And Speaker Verification Methods\",\"authors\":\"Jayant Gambhir, Vaishali Patil\",\"doi\":\"10.1109/ICMSS53060.2021.9673603\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper gives a brief review of the techniques available for speech authentication based on edit detection and speaker verification related to application in forensics. Many past research includes the traditional methods like ENF, DFT, STFT based analysis for speech authentication while some advanced emerging trends like SVM, Ensemble learning and Convolution Neural network have been employed for speech authentication in different application. Similarly, for speaker verification, features such as LPC, MFCC, i-vector, x-vector and techniques like Neural Network, Deep learning etc have been researched. This paper summaries the various experimental results and their merits and demerits from the research papers surveyed. This review is expected to guide towards making an unbiased decision in choosing most promising method for authentication of Speaker and Speech data in forensic application.\",\"PeriodicalId\":274597,\"journal\":{\"name\":\"2021 Fourth International Conference on Microelectronics, Signals & Systems (ICMSS)\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Fourth International Conference on Microelectronics, Signals & Systems (ICMSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMSS53060.2021.9673603\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Fourth International Conference on Microelectronics, Signals & Systems (ICMSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMSS53060.2021.9673603","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review On Speech Authentication And Speaker Verification Methods
This paper gives a brief review of the techniques available for speech authentication based on edit detection and speaker verification related to application in forensics. Many past research includes the traditional methods like ENF, DFT, STFT based analysis for speech authentication while some advanced emerging trends like SVM, Ensemble learning and Convolution Neural network have been employed for speech authentication in different application. Similarly, for speaker verification, features such as LPC, MFCC, i-vector, x-vector and techniques like Neural Network, Deep learning etc have been researched. This paper summaries the various experimental results and their merits and demerits from the research papers surveyed. This review is expected to guide towards making an unbiased decision in choosing most promising method for authentication of Speaker and Speech data in forensic application.