We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Digital Signal Matching Technique

Published on July 2015 by Sushant S. Kalamkar, Anuradha S.kakade, Niked P. Bhajibhakare
National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
Foundation of Computer Science USA
NCKITE2015 - Number 2
July 2015
Authors: Sushant S. Kalamkar, Anuradha S.kakade, Niked P. Bhajibhakare
cc78eb7f-3f15-46f2-bb31-9a3fb9c2a7a6

Sushant S. Kalamkar, Anuradha S.kakade, Niked P. Bhajibhakare . Digital Signal Matching Technique. National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015). NCKITE2015, 2 (July 2015), 27-30.

@article{
author = { Sushant S. Kalamkar, Anuradha S.kakade, Niked P. Bhajibhakare },
title = { Digital Signal Matching Technique },
journal = { National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015) },
issue_date = { July 2015 },
volume = { NCKITE2015 },
number = { 2 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 27-30 },
numpages = 4,
url = { /proceedings/nckite2015/number2/21487-2656/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
%A Sushant S. Kalamkar
%A Anuradha S.kakade
%A Niked P. Bhajibhakare
%T Digital Signal Matching Technique
%J National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
%@ 0975-8887
%V NCKITE2015
%N 2
%P 27-30
%D 2015
%I International Journal of Computer Applications
Abstract

This paper describes the Matching Model of two different voices. Here, we are working on Digital Signals & Frequency of particular Speech. We have use Mel Frequency Cepstrum Coefficients (MFCC) for matching the frequency of speech as well as used the DISTMIN for calculating the minimum distance between two different signals. This technique gives the accuracy about authorized speaker. This will shows the average of matched voice so that you can identify the speaker or voice of that speaker.

References
  1. Maes S. H. and Beigi H. S. : Open Sesame! Speech password or key to secure your door. In Proc. ACCV, (1988), invited paper.
  2. Maes S. H. : Conversational biometrics In Proc. Of the European Conference on Speech Communication and Technology (EUROPSPEECH), Budapest Hungry, (1999).
  3. Ganesh Tiwari, "Text Prompted Remote Speaker Authentication : Joint Speech and Speaker Recognision/Verification System".
  4. Ahsanul kabir, Sheikh Mohammad Masudul Ahsan,"Vector Quantization in Text Dependent Automatic Speaker Recognision using Mel-Frequency Cepstrum Coefficient", 6th WSEAS Computer Science & Engineering: An international Journal (CSEIJ), Vol. 3, No. 4, August 2013 27 International Conference on circuits, systems, electronics, control & signal processing, Cairo,Egypt, dec 29-1,2007,page 352-355
  5. Lindasalwa Muda, Mumtaj Begam and Elamvazuthi, "Voice Recognision Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and DTW Technique ",Journal of Computing, Volume 2, Issue 3, March 2010
  6. Mahdi Shaneh and Azizollah Taheri. "Voice Command Recognision System based on MFCC and VQ
  7. Algorithms", World Academy of Science, Engineering and Technology Journal, 2009 Rosenberg A. E. and Parthasarathy S. : Speaker identification with user-selected password phrases. In Proc. Eurospeech, volume 3, pages 1371{1374,(1997).
  8. Li Q. , Juange B. -H. , Zhou Q. , and Lee C. -H: Verbal information verification. In Proc. Eurospeech, volume 2, pages 839{842, (1997). 16. Maes S. H. and Beigi H. S. : Open Seame! Speech pas.
  9. Kimball O. , Schmidt M. , Gish H. , and Waterman J. : Speaker Verification with limited enrollment data. In Proc. Eurospeech, volume 2, pages 967{970,(1997). 14. Lee C. -H. , Soong F. K. , and Paliwal K. K. , editors: Automatic speech and speak.
  10. M. A. Anusuya Department of Computer Science and Engineering Sri Jaya chamarajendra College of Engineering Mysore, India, S. K. Katti Department of Computer Science and Engineering Sri Jayachamarajendra College of Engineering Mysore, India : Speech Recognition by Machine: A Review, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 3, 2009
  11. Svendsen T. , Paliwal K. K. , Harborg E. , Husy P. O. (1989). Proc. ICASSP'89, Glasgow
  12. Rabiner, L. , R. , and Wilpon, J. G. , (1979). Considerations in applying clustering techniques to speaker-independent word recognision. Journal of Acoustic Society of America66(3):663-673.
  13. Wilpon J. G. , D. M. DeMarco, R. P. Mikkilineni (1998) "Isolated word recognision over the DD telephone network –Result of two extensive field studies", Proc. ICASSP,pp. 55-58
Index Terms

Computer Science
Information Sciences

Keywords

Analysis Mfcc Distmin Feature Extraction Record Function Bandpass Filtering