0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Speaker Authentication (Hardcover, 2012): Qi (Peter) Li Speaker Authentication (Hardcover, 2012)
Qi (Peter) Li
R4,031 Discovery Miles 40 310 Ships in 18 - 22 working days

This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker 's identity based on his/her voice characteristics while the VIV approach validates a speaker 's identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications.The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speaker authentication systems. Advanced and useful topics and algorithms are selected with real design examples and evaluation results. Special attention is given to the topics related to improving overall system robustness and performances, such as robust endpoint detection, fast discriminative training theory and algorithms, detection-based decoding, sequential authentication, etc. For example, the sequential authentication was developed based on statistical sequential testing theory. By adding enough subtests, a speaker authentication system can achieve any accuracy requirement. The procedure of designing the sequential authentication will be presented. For any presented technique, we will provide experimental results to validate the usefulness. We will also highlight the important developments in academia, government, and industry, and outline a few open issues.As the methodologies developed in speaker authentication span several diverse fields, the tutorial book provides an introductory forum for a broad spectrum of researchers and developers from different areas to acquire the knowledge and skills to engage in the interdisciplinary fields of user authentication, biometrics, speech and speaker recognition, multimedia, and dynamic pattern recognition.

Speaker Authentication (Paperback, 2012 ed.): Qi (Peter) Li Speaker Authentication (Paperback, 2012 ed.)
Qi (Peter) Li
R4,003 Discovery Miles 40 030 Ships in 18 - 22 working days

This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker's identity based on his/her voice characteristics while the VIV approach validates a speaker's identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speaker authentication systems. Advanced and useful topics and algorithms are selected with real design examples and evaluation results. Special attention is given to the topics related to improving overall system robustness and performances, such as robust endpoint detection, fast discriminative training theory and algorithms, detection-based decoding, sequential authentication, etc. For example, the sequential authentication was developed based on statistical sequential testing theory. By adding enough subtests, a speaker authentication system can achieve any accuracy requirement. The procedure of designing the sequential authentication will be presented. For any presented technique, we will provide experimental results to validate the usefulness. We will also highlight the important developments in academia, government, and industry, and outline a few open issues. As the methodologies developed in speaker authentication span several diverse fields, the tutorial book provides an introductory forum for a broad spectrum of researchers and developers from different areas to acquire the knowledge and skills to engage in the interdisciplinary fields of user authentication, biometrics, speech and speaker recognition, multimedia, and dynamic pattern recognition.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,173 Discovery Miles 11 730
Waste and Byproducts in Cement-Based…
Jorge de Brito, Carlos Thomas, … Paperback R6,794 Discovery Miles 67 940
The Great Post Office Scandal - The…
Nick Wallis Hardcover R639 Discovery Miles 6 390
Modern Earth Buildings - Materials…
M.R. Hall, R. Lindsay, … Hardcover R5,709 Discovery Miles 57 090
Enterprise Risk Management and COSO - A…
H Cendrowski Hardcover R2,196 Discovery Miles 21 960
The Edinburgh Review - or Critical…
Sydney Smith Paperback R781 Discovery Miles 7 810
RYA Pocket Guide to Boating Knots
R225 Discovery Miles 2 250
Die Singende Hand - Versamelde Gedigte…
Breyten Breytenbach Paperback R390 R348 Discovery Miles 3 480
Verimark Genesis Pet Stains & Odour…
R100 Discovery Miles 1 000
Farm Killings In South Africa
Nechama Brodie Paperback R341 Discovery Miles 3 410

 

Partners