Now showing items 1-4 of 4
Turkish Text-Dependent Speaker Verification using i-vector/PLDA Approach
i-vector feature extraction is the state-of-the-art technique for text-independent speaker recognition. There exist studies in literature utilizing i-vector approach for text-dependent speaker verification. However, its ...
Speaker Recognition Anti-spoofing Using Linear Prediction Residual
Speaker recognition systems have recently proven to be highly vulnerable against spoofing attacks. Therefore, it is important to detect spoofing attacks performed by speech synthesis and voice conversion in order to improve ...
Replay Spoofing Attack Detection Using Deep Neural Networks
In recent years, there has been increased interest in speaker verification(SV) systems and their usage has become widespread. This situation made the detecting of spoofing attacks, the discrimination of genuine speech from ...
A Study on Turkish Text - Dependent Speaker Recognition
Speaker recognition is a pattern recognition task which has long been studied, but the accuracies are still far from the desired levels. The majority of the studies on speaker recognition demonstrates the results obtained ...