Skip to Content
Biometric Authentication: A Machine Learning Approach
book

Biometric Authentication: A Machine Learning Approach

by S. Y. Kung, M. W. Mak, S. H. Lin
September 2004
Intermediate to advanced
496 pages
13h 57m
English
Pearson
Content preview from Biometric Authentication: A Machine Learning Approach

9.2. Speaker Recognition

The goal of automatic speaker recognition—Campbell [45] and Furui [109]—is to recognize a speaker from his or her voice. Speaker recognition can generally be divided into two categories: speaker identification and speaker verification. Speaker identification determines the identity of an unknown speaker from a group of known speakers; speaker verification authenticates the identity of a speaker based on his or her own voice. A speaker claiming an identity is called a claimant, and an unregistered speaker pretending to be a registered speaker is called an impostor. An ideal speaker recognition system should not reject registered speakers (false rejections) or accept impostors (false acceptances).

Speaker recognition can ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti
Signal and Image Processing for Biometrics

Signal and Image Processing for Biometrics

Amine Naït-Ali, Régis Fournier
Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice

Abhijit Das, C. E. Veni Madhavan

Publisher Resources

ISBN: 0131478249Purchase book