Skip to main content

Speaker Authentication System Design

  • Chapter
  • First Online:
Speaker Authentication

Part of the book series: Signals and Communication Technology ((SCT))

  • 734 Accesses

Abstract

In this book, we have introduced various speaker authentication techniques. Each of the techniques can be considered as a technical component, such as speaker identification, speaker verification, verbal information verification, and so on. In real-world applications, a speaker authentication system can be designed by combining the technical components to construct a useful and convenient system to meet the requirements of a particular application. In this chapter we provide an example of a speaker authentication system design. Following this example, the author hopes readers can design their own system for their particular applications to improve the security level of the protected system. This design example was originally reported in [2].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, Q. and Juang, B.-H., Speaker verification using verbal information verifica- tion for automatic enrollment, in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (Seattle), May 1998

    Google Scholar 

  2. Li, Q., Juang, B.-H., Zhou, Q., Lee, C.-H.: Automatic verbal information verification for user authentication. IEEE Trans. on Speech and Audio Processing 8, 585–596 (2000)

    Article  Google Scholar 

  3. Parthasarathy, S. and Rosenberg, A. E., General phrase speaker verification using sub-word background models and likelihood-ratio scoring, in Proceedings of ICSLP-96 (Philadelphia), October 1996

    Google Scholar 

  4. Rosenberg, A. E. and Parthasarathy, S., Speaker background models for con- nected digit password speaker verification, in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (Atlanta), pp. 81–84, May 1996

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi (Peter) Li .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Li, Q.(. (2012). Speaker Authentication System Design. In: Speaker Authentication. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23731-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23731-7_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23730-0

  • Online ISBN: 978-3-642-23731-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics