Voice code verification algorithm using competing models for user entrance authentication

Heungkyu Lee, Hanseok Ko

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we propose a voice code verification method for an intelligent surveillance guard robot, wherein a robot prompts for a code (i.e. word or phrase) for verification. In the application scenario, the voice code can be changed every day for security reasoning and the targeting domain is unlimited. Thus, the voice code verification system not only requires the text-prompted and speaker independent verification, but also it should not require an extra trained model as an alternative hypothesis for log-likelihood ratio test because of memory limitation. To resolve these issues, we propose to exploit the subword based anti-models for log-likelihood normalization through reusing an acoustic model and competing with voice code model. The anti-model is automatically produced by using the statistical distance of phonemes against a voice code. In addition, a harmonics-based spectral subtraction algorithm is applied for a noisy robust system on an outdoor environment. The performance evaluation is done by using a common Korean database, PBW452DB, which consists of 63,280 utterances of 452 isolated words recorded in silent environment.

Original languageEnglish
Title of host publicationLecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
EditorsG.I. Webb, X. Yu
Pages610-622
Number of pages13
Volume3339
Publication statusPublished - 2004
Event17th Australian Joint Conference on Artificial Intelligence, AI 2004: Advances in Artificial Intelligence - Cairns, Australia
Duration: 2004 Dec 42004 Dec 6

Other

Other17th Australian Joint Conference on Artificial Intelligence, AI 2004: Advances in Artificial Intelligence
CountryAustralia
CityCairns
Period04/12/404/12/6

Fingerprint

Authentication
Robots
Acoustics
Data storage equipment

ASJC Scopus subject areas

  • Hardware and Architecture

Cite this

Lee, H., & Ko, H. (2004). Voice code verification algorithm using competing models for user entrance authentication. In G. I. Webb, & X. Yu (Eds.), Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) (Vol. 3339, pp. 610-622)

Voice code verification algorithm using competing models for user entrance authentication. / Lee, Heungkyu; Ko, Hanseok.

Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). ed. / G.I. Webb; X. Yu. Vol. 3339 2004. p. 610-622.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, H & Ko, H 2004, Voice code verification algorithm using competing models for user entrance authentication. in GI Webb & X Yu (eds), Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). vol. 3339, pp. 610-622, 17th Australian Joint Conference on Artificial Intelligence, AI 2004: Advances in Artificial Intelligence, Cairns, Australia, 04/12/4.
Lee H, Ko H. Voice code verification algorithm using competing models for user entrance authentication. In Webb GI, Yu X, editors, Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). Vol. 3339. 2004. p. 610-622
Lee, Heungkyu ; Ko, Hanseok. / Voice code verification algorithm using competing models for user entrance authentication. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). editor / G.I. Webb ; X. Yu. Vol. 3339 2004. pp. 610-622
@inproceedings{4d582f0cf64b48b4baef4a688813b7b4,
title = "Voice code verification algorithm using competing models for user entrance authentication",
abstract = "In this paper, we propose a voice code verification method for an intelligent surveillance guard robot, wherein a robot prompts for a code (i.e. word or phrase) for verification. In the application scenario, the voice code can be changed every day for security reasoning and the targeting domain is unlimited. Thus, the voice code verification system not only requires the text-prompted and speaker independent verification, but also it should not require an extra trained model as an alternative hypothesis for log-likelihood ratio test because of memory limitation. To resolve these issues, we propose to exploit the subword based anti-models for log-likelihood normalization through reusing an acoustic model and competing with voice code model. The anti-model is automatically produced by using the statistical distance of phonemes against a voice code. In addition, a harmonics-based spectral subtraction algorithm is applied for a noisy robust system on an outdoor environment. The performance evaluation is done by using a common Korean database, PBW452DB, which consists of 63,280 utterances of 452 isolated words recorded in silent environment.",
author = "Heungkyu Lee and Hanseok Ko",
year = "2004",
language = "English",
volume = "3339",
pages = "610--622",
editor = "G.I. Webb and X. Yu",
booktitle = "Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)",

}

TY - GEN

T1 - Voice code verification algorithm using competing models for user entrance authentication

AU - Lee, Heungkyu

AU - Ko, Hanseok

PY - 2004

Y1 - 2004

N2 - In this paper, we propose a voice code verification method for an intelligent surveillance guard robot, wherein a robot prompts for a code (i.e. word or phrase) for verification. In the application scenario, the voice code can be changed every day for security reasoning and the targeting domain is unlimited. Thus, the voice code verification system not only requires the text-prompted and speaker independent verification, but also it should not require an extra trained model as an alternative hypothesis for log-likelihood ratio test because of memory limitation. To resolve these issues, we propose to exploit the subword based anti-models for log-likelihood normalization through reusing an acoustic model and competing with voice code model. The anti-model is automatically produced by using the statistical distance of phonemes against a voice code. In addition, a harmonics-based spectral subtraction algorithm is applied for a noisy robust system on an outdoor environment. The performance evaluation is done by using a common Korean database, PBW452DB, which consists of 63,280 utterances of 452 isolated words recorded in silent environment.

AB - In this paper, we propose a voice code verification method for an intelligent surveillance guard robot, wherein a robot prompts for a code (i.e. word or phrase) for verification. In the application scenario, the voice code can be changed every day for security reasoning and the targeting domain is unlimited. Thus, the voice code verification system not only requires the text-prompted and speaker independent verification, but also it should not require an extra trained model as an alternative hypothesis for log-likelihood ratio test because of memory limitation. To resolve these issues, we propose to exploit the subword based anti-models for log-likelihood normalization through reusing an acoustic model and competing with voice code model. The anti-model is automatically produced by using the statistical distance of phonemes against a voice code. In addition, a harmonics-based spectral subtraction algorithm is applied for a noisy robust system on an outdoor environment. The performance evaluation is done by using a common Korean database, PBW452DB, which consists of 63,280 utterances of 452 isolated words recorded in silent environment.

UR - http://www.scopus.com/inward/record.url?scp=22944478657&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=22944478657&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:22944478657

VL - 3339

SP - 610

EP - 622

BT - Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)

A2 - Webb, G.I.

A2 - Yu, X.

ER -