Speaker recognition
[dummy-text]
Speaker recognition
Jump to navigation
Jump to search
Speaker recognition is the identification of a person from characteristics of voices (voice biometrics).[1] The term voice recognition[2][3][4][5][6] can refer to Speaker recognition (who is speaking) or speech recognition (what's being said). Speaker verification (also called speaker authentication) contrasts with identification, and speaker recognition differs from speaker diarisation (recognizing when the same speaker is speaking).
Recognizing the speaker can simplify the task of translating speech in systems that have been trained on specific voices or it can be used to authenticate or verify the identity of a speaker as part of a security process. Speaker recognition has a history dating back some four decades and uses the acoustic features of speech that have been found to differ between individuals. These acoustic patterns reflect both anatomy and learned behavioral patterns.
Contents
1 Verification versus identification
2 Training
3 Variants of speaker recognition
4 Technology
5 Applications
6 See also
7 Notes
8 References
9 External links
9.1 Software
Verification versus identification[edit]
There are two major applications of speaker recognition technologies and methodologies. If the speaker claims to be of a certain identity and the voice is used to verify this claim, this is called verification or authentication. On the other hand, identification is the task of determining an unknown speaker's identity. In a sense, speaker verification is a 1:1 match where one speaker's voice is matched to a particular template whereas speaker identification is a 1:N match where the voice is compared against a certain amount of templates.
From a security perspective, identification is different from verification. Speaker verification is usually employed as a "gatekeeper" in order to provide access to a secure system. These systems operate with the users' knowledge and typically require their cooperation. Speaker identification systems can also be implemented covertly without the user's knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.
In forensic applications, it is common to first perform a speaker identification process to create a list of "best matches" and then perform a series of verification processes to determine a conclusive match.[citation needed]
Training[edit]
One of the earliest training technologies to commercialize was implemented in the Siri doll. At that point, speaker independence was an intended breakthrough, and systems required a training period. A 1987 ad for the doll carried the tagline "Finally, the doll that understands you." - despite the fact that it was described as "which children could train to respond to their voice."[7] The term voice recognition, even a decade later, referred to speaker independence.[8]
Variants of speaker recognition[edit]
Each speaker recognition system has two phases: Enrollment and verification. During enrollment, the speaker's voice is recorded and typically a number of features are extracted to form a voice print, template, or model. In the verification phase, a speech sample or "utterance" is compared against a previously created voice print. For identification systems, the utterance is compared against multiple voice prints in order to determine the best match(es) while verification systems compare an utterance against a single voice print. Because of the process involved, verification is faster than identification.
Speaker recognition systems fall into two categories: text-dependent and text-independent.[9]
Text-Dependent:
If the text must be the same for enrollment and verification this is called text-dependent recognition.[10] In a text-dependent system, prompts can either be common across all speakers (e.g. a common pass phrase) or unique. In addition, the use of shared-secrets (e.g.: passwords and PINs) or knowledge-based information can be employed in order to create a multi-factor authentication scenario.
Text-Independent:
Text-independent systems are most often used for speaker identification as they require very little if any cooperation by the speaker. In this case the text during enrollment and test is different. In fact, the enrollment may happen without the user's knowledge, as in the case for many forensic applications. As text-independent technologies do not compare what was said at enrollment and verification, verification applications tend to also employ speech recognition to determine what the user is saying at the point of authentication.
In text independent systems both acoustics and speech analysis techniques are used.[11]
Technology[edit]
Speaker recognition is a pattern recognition problem. The various technologies used to process and store voice prints include frequency estimation, hidden Markov models, Gaussian mixture models, pattern matching algorithms, neural networks, matrix representation, vector quantization and decision trees. For comparing utterances against voice prints, more basic methods like cosine similarity are traditionally used for their simplicity and performance. Some systems also use "anti-speaker" techniques such as cohort models and world models. Spectral features are predominantly used in representing speaker characteristics.[12]
Ambient noise levels can impede both collections of the initial and subsequent voice samples. Noise reduction algorithms can be employed to improve accuracy, but incorrect application can have the opposite effect. Performance degradation can result from changes in behavioural attributes of the voice and from enrollment using one telephone and verification on another telephone. Integration with two-factor authentication products is expected to increase. Voice changes due to ageing may impact system performance over time. Some systems adapt the speaker models after each successful verification to capture such long-term changes in the voice, though there is debate regarding the overall security impact imposed by automated adaptation.
Capture of the biometric is seen as non-invasive. The technology traditionally uses existing microphones and voice transmission technology allowing recognition over long distances via ordinary telephones (wired or wireless).
Digitally recorded audio voice identification and analogue recorded voice identification uses electronic measurements as well as critical listening skills that must be applied by a forensic expert in order for the identification to be accurate.
Applications[edit]
The first international patent was filed in 1983, coming from the telecommunication research in CSELT[13] (Italy) by Michele Cavazza and Alberto Ciaramella as a basis for both future telco services to final customers and to improve the noise-reduction techniques across the network.
Between 1996 and 1998, speaker recognition technology was used at the Scobey–Coronach Border Crossing to enable enrolled local residents with nothing to declare to cross the Canada–United States border when the inspection stations were closed for the night.[14] The system was developed for the U.S. Immigration and Naturalization Service by Voice Strategies of Warren, Michigan.[citation needed]
In May 2013 it was announced that Barclays Wealth was to use passive speaker recognition to verify the identity of telephone customers within 30 seconds of normal conversation.[15] The system used had been developed by voice recognition company Nuance (that in 2011 acquired the company Loquendo, the spin-off from CSELT itself for speech technology), the company behind Apple's Siri technology. A verified voiceprint was to be used to identify callers to the system and the system would in the future be rolled out across the company.
The private banking division of Barclays was the first financial services firm to deploy voice biometrics as the primary means to authenticate customers to their call centers. 93% of customer users had rated the system at "9 out of 10" for speed, ease of use and security.[16]
Since then, Nuance Voice Biometrics solutions have been deployed across several financial institutions, including Banco Santander, Royal Bank of Canada, Tangerine Bank, and Manulife.[17]
In August 2014 GoVivace Inc. deployed a speaker identification system that allowed its telecom industry client to positively search for an individual among millions of speakers by using just a single example recording of their voice.[18]
Speaker recognition may also be used in criminal investigations, such as those of the 2014 executions of, amongst others, James Foley and Steven Sotloff.[19]
In February 2016 UK high-street bank HSBC and its internet-based retail bank First Direct announced that it would offer 15 million customers its biometric banking software to access online and phone accounts using their fingerprint or voice.[20]
See also[edit]
- AI effect
- Applications of artificial intelligence
- Speaker diarisation
- Speech recognition
- Voice changer
- Lists
- List of emerging technologies
- Outline of artificial intelligence
Notes[edit]
^ Poddar, Arnab; Sahidullah, Md; Saha, Goutam (March 2018). "Speaker Verification with Short Utterances: A Review of Challenges, Trends and Opportunities". IET Biometrics. 7 (2): 91–101. doi:10.1049/iet-bmt.2017.0065..mw-parser-output cite.citationfont-style:inherit.mw-parser-output qquotes:"""""""'""'".mw-parser-output code.cs1-codecolor:inherit;background:inherit;border:inherit;padding:inherit.mw-parser-output .cs1-lock-free abackground:url("//upload.wikimedia.org/wikipedia/commons/thumb/6/65/Lock-green.svg/9px-Lock-green.svg.png")no-repeat;background-position:right .1em center.mw-parser-output .cs1-lock-limited a,.mw-parser-output .cs1-lock-registration abackground:url("//upload.wikimedia.org/wikipedia/commons/thumb/d/d6/Lock-gray-alt-2.svg/9px-Lock-gray-alt-2.svg.png")no-repeat;background-position:right .1em center.mw-parser-output .cs1-lock-subscription abackground:url("//upload.wikimedia.org/wikipedia/commons/thumb/a/aa/Lock-red-alt-2.svg/9px-Lock-red-alt-2.svg.png")no-repeat;background-position:right .1em center.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registrationcolor:#555.mw-parser-output .cs1-subscription span,.mw-parser-output .cs1-registration spanborder-bottom:1px dotted;cursor:help.mw-parser-output .cs1-hidden-errordisplay:none;font-size:100%.mw-parser-output .cs1-visible-errorfont-size:100%.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration,.mw-parser-output .cs1-formatfont-size:95%.mw-parser-output .cs1-kern-left,.mw-parser-output .cs1-kern-wl-leftpadding-left:0.2em.mw-parser-output .cs1-kern-right,.mw-parser-output .cs1-kern-wl-rightpadding-right:0.2em
^ Pollack, Pickett, Sumby (1974). Experimental phonetics. MSS Information Corporation. pp. 251–258. ISBN 0-8422-5149-9.CS1 maint: Multiple names: authors list (link)
^ Van Lancker and Kreiman (July 3, 1984). "Familiar voice recognition: Patterns and parameters. Part I: Recognition of backward voices" (PDF). Journal of Phonetics. pp. 19–38. Retrieved February 21, 2012.
^ "British English definition of voice recognition". Macmillan Publishers Limited. Retrieved February 21, 2012.
^ "voice recognition, definition of". WebFinance, Inc. Retrieved February 21, 2012.
^ "Linux Gazette 114". Linux Gazette. Retrieved February 21, 2012.
^ Melanie Pinola (November 2, 2011). "Speech Recognition Through the Decades: How We Ended Up With Siri". PC World.
^ "Voice Recognition To Ease Travel Bookings: Business Travel News". BusinessTravelNews.com. March 3, 1997.The earliest applications of speech recognition software were dictation ... Four months ago, IBM introduced a "continual dictation product" designed to ... debuted at the National Business Travel Association trade show in 1994.
^ "Speaker Verification: Text-Dependent vs. Text-Independent". microsoft.com. August 20, 2006.text-dependent and text-independent speaker .. both equal error rate and detection ..
^ M. Hebert (2008). "Text-Dependent Speaker Recognition".task .. verification or identification
^ Lisa Myers (April 19, 2004). "An Exploration of Voice Biometrics".
^ Sahidullah, Md.; Kinnunen, Tomi (March 2016). "Local spectral variability features for speaker verification". Digital Signal Processing. 50: 1–11. doi:10.1016/j.dsp.2015.10.011.
^ US4752958 A, Michele Cavazza, Alberto Ciaramella, "Device for speaker's verification" http://www.google.com/patents/US4752958?hl=it&cl=en
^ Meyer, Barb (June 12, 1996). "Automated Border Crossing". Television news report. Meyer Television News.
^ International Banking (December 27, 2013). "Voice Biometric Technology in Banking | Barclays". Wealth.barclays.com. Retrieved February 21, 2016.
^ Matt Warman (May 8, 2013). "Say goodbye to the pin: voice recognition takes over at Barclays Wealth". Retrieved June 5, 2013.
^ "Voice Biometrics for fast, secure authentication in your IVR and mobile apps". Nuance. Retrieved February 21, 2016.
^ "Speaker Identification". GoVivace Inc. Retrieved 3 September 2014.
^ Ewen MacAskill. "Did 'Jihadi John' kill Steven Sotloff? | Media". The Guardian. Retrieved February 21, 2016.
^ Julia Kollewe (February 19, 2016). "HSBC rolls out voice and touch ID security for bank customers | Business". The Guardian. Retrieved February 21, 2016.
References[edit]
"Biometrics from the movies" –National Institute of Standards and Technology- Elisabeth Zetterholm (2003), Voice Imitation. A Phonetic Study of Perceptual Illusions and Acoustic Success, Phd thesis, Lund University.
- Md Sahidullah (2015), Enhancement of Speaker Recognition Performance Using Block Level, Relative and Temporal Information of Subband Energies, PhD thesis, Indian Institute of Technology Kharagpur.
External links[edit]
Circumventing Voice Authentication The PLA Radio podcast recently featured a simple way to fool rudimentary voice authentication systems.- Speaker recognition – Scholarpedia
- Voice recognition benefits and challenges in access control
Software[edit]
- bob.bio.spear
- ALIZE
Categories:
- Speaker recognition
- Speech processing
- Voice technology
- Automatic identification and data capture
- Biometrics
(window.RLQ=window.RLQ||).push(function()mw.config.set("wgPageParseReport":"limitreport":"cputime":"0.296","walltime":"0.372","ppvisitednodes":"value":1120,"limit":1000000,"ppgeneratednodes":"value":0,"limit":1500000,"postexpandincludesize":"value":33888,"limit":2097152,"templateargumentsize":"value":1193,"limit":2097152,"expansiondepth":"value":12,"limit":40,"expensivefunctioncount":"value":4,"limit":500,"unstrip-depth":"value":1,"limit":20,"unstrip-size":"value":51174,"limit":5000000,"entityaccesscount":"value":1,"limit":400,"timingprofile":["100.00% 339.275 1 -total"," 68.44% 232.188 1 Template:Reflist"," 32.73% 111.036 2 Template:Cite_journal"," 20.45% 69.385 14 Template:Cite_web"," 16.71% 56.708 2 Template:Fix"," 15.53% 52.689 1 Template:Citation_needed"," 10.92% 37.054 4 Template:Category_handler"," 9.50% 32.247 1 Template:Use_mdy_dates"," 4.57% 15.494 1 Template:DMCA"," 4.51% 15.292 2 Template:Delink"],"scribunto":"limitreport-timeusage":"value":"0.191","limit":"10.000","limitreport-memusage":"value":4636273,"limit":52428800,"cachereport":"origin":"mw1316","timestamp":"20181203190201","ttl":1900800,"transientcontent":false);mw.config.set("wgBackendResponseTime":98,"wgHostname":"mw1265"););