scholarly journals Speaker verification system based on articulatory information from ultrasound recordings

DYNA ◽  
2020 ◽  
Vol 87 (213) ◽  
pp. 9-16
Author(s):  
Franklin Alexander Sepulveda Sepulveda ◽  
Dagoberto Porras-Plata ◽  
Milton Sarria-Paja

Current state-of-the-art speaker verification (SV) systems are known to be strongly affected by unexpected variability presented during testing, such as environmental noise or changes in vocal effort. In this work, we analyze and evaluate articulatory information of the tongue's movement as a means to improve the performance of speaker verification systems. We use a Spanish database, where besides the speech signals, we also include articulatory information that was acquired with an ultrasound system. Two groups of features are proposed to represent the articulatory information, and the obtained performance is compared to an SV system trained only with acoustic information. Our results show that the proposed features contain highly discriminative information, and they are related to speaker identity; furthermore, these features can be used to complement and improve existing systems by combining such information with cepstral coefficients at the feature level.

Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1706
Author(s):  
Soonshin Seo ◽  
Ji-Hwan Kim

One of the most important parts of a text-independent speaker verification system is speaker embedding generation. Previous studies demonstrated that shortcut connections-based multi-layer aggregation improves the representational power of a speaker embedding system. However, model parameters are relatively large in number, and unspecified variations increase in the multi-layer aggregation. Therefore, in this study, we propose a self-attentive multi-layer aggregation with feature recalibration and deep length normalization for a text-independent speaker verification system. To reduce the number of model parameters, we set the ResNet with the scaled channel width and layer depth as a baseline. To control the variability in the training, we apply a self-attention mechanism to perform multi-layer aggregation with dropout regularizations and batch normalizations. Subsequently, we apply a feature recalibration layer to the aggregated feature using fully-connected layers and nonlinear activation functions. Further, deep length normalization is used on a recalibrated feature in the training process. Experimental results using the VoxCeleb1 evaluation dataset showed that the performance of the proposed methods was comparable to that of state-of-the-art models (equal error rate of 4.95% and 2.86%, using the VoxCeleb1 and VoxCeleb2 training datasets, respectively).


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Hongwei Luo ◽  
Yijie Shen ◽  
Feng Lin ◽  
Guoai Xu

Speaker verification system has gained great popularity in recent years, especially with the development of deep neural networks and Internet of Things. However, the security of speaker verification system based on deep neural networks has not been well investigated. In this paper, we propose an attack to spoof the state-of-the-art speaker verification system based on generalized end-to-end (GE2E) loss function for misclassifying illegal users into the authentic user. Specifically, we design a novel loss function to deploy a generator for generating effective adversarial examples with slight perturbation and then spoof the system with these adversarial examples to achieve our goals. The success rate of our attack can reach 82% when cosine similarity is adopted to deploy the deep-learning-based speaker verification system. Beyond that, our experiments also reported the signal-to-noise ratio at 76 dB, which proves that our attack has higher imperceptibility than previous works. In summary, the results show that our attack not only can spoof the state-of-the-art neural-network-based speaker verification system but also more importantly has the ability to hide from human hearing or machine discrimination.


Author(s):  
Dirk Beyer

Abstract This report describes the 2020 Competition on Software Verification (SV-COMP), the 9$$^{\text {th}}$$ edition of a series of comparative evaluations of fully automatic software verifiers for C and Java programs. The competition provides a snapshot of the current state of the art in the area, and has a strong focus on replicability of its results. The competition was based on 11 052 verification tasks for C programs and 416 verification tasks for Java programs. Each verification task consisted of a program and a property (reachability, memory safety, overflows, termination). SV-COMP 2020 had 28 participating verification systems from 11 countries.


2021 ◽  
pp. 20210469
Author(s):  
Peter Meidahl Petersen ◽  
N George Mikhaeel ◽  
Umberto Ricardi ◽  
Jessica L Brady

This status article describes current state-of-the-art radiotherapy for lymphomas and new emerging techniques. Current state-of-the-art radiotherapy is sophisticated, individualised, CT-based, intensity-modulated treatment, using PET/CT to define the target. The concept of involved site radiotherapy should be used, delineating the target using the exact same principles as for solid tumours. The optimal treatment delivery includes motion management and online treatment verification systems, which reduce intra- and interfractional anatomical variation. Emerging radiotherapy techniques in lymphomas include adaptive radiotherapy in MR- and CT-based treatment systems and proton therapy. The next generation linear accelerators have the capability to deliver adaptive treatment and allow relatively quick online adaptation to the daily variations of the anatomy. The computer systems use machine leaning to facilitate rapid automatic contouring of the target and organs-at-risk. Moreover, emerging MR-based planning and treatment facilities allow target definition directly from MR scans and allow intra-fractional tracking of structures recognisable on MR. Proton facilities are now being widely implemented. The benefits of proton therapy are due to the physical properties of protons, which in many cases allow sparing of normal tissue. The variety of techniques in modern radiotherapy means that the radiation oncologist must be able to choose the right technique for each patient. The choice is mainly based on experience and standard protocols, but new systems calculating risks for the patients with a specific treatment plan and also systems integrating clinical factors and risk factors into the planning process itself are emerging.


Author(s):  
Choon Beng Tan ◽  
Mohd Hanafi Ahmad Hijazi ◽  
Norazlina Khamis ◽  
Puteri Nor Ellyza binti Nohuddin ◽  
Zuraini Zainol ◽  
...  

AbstractThe emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems such as Automatic Speaker Verification (ASV) systems are weak against presentation attacks. A presentation attack is a spoofing attack launched to subvert an ASV system to gain access to the system. Though numerous Presentation Attack Detection (PAD) systems were reported in the literature, a systematic survey that describes the current state of research and application is unavailable. This paper presents a systematic analysis of the state-of-the-art voice PAD systems to promote further advancement in this area. The objectives of this paper are two folds: (i) to understand the nature of recent work on PAD systems, and (ii) to identify areas that require additional research. From the survey, a taxonomy of voice PAD and the trend analysis of recent work on PAD systems were built and presented, whereby the recent and relevant articles including articles from Interspeech and ICASSP Conferences, mostly indexed by Scopus, published between 2015 and 2021 were considered. A total of 172 articles were surveyed in this work. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established. The findings of this survey present the limitation of recent works, which include spoof-type dependent PAD. Consequently, the future direction of work on voice PAD for interested researchers is established.


2021 ◽  
Vol 14 (40) ◽  
pp. 3026-3050
Author(s):  
Ankita Chadha ◽  
◽  
Azween Abdullah ◽  
Lorita Angeline ◽  
Sivakumar Sivanesan

1995 ◽  
Vol 38 (5) ◽  
pp. 1126-1142 ◽  
Author(s):  
Jeffrey W. Gilger

This paper is an introduction to behavioral genetics for researchers and practioners in language development and disorders. The specific aims are to illustrate some essential concepts and to show how behavioral genetic research can be applied to the language sciences. Past genetic research on language-related traits has tended to focus on simple etiology (i.e., the heritability or familiality of language skills). The current state of the art, however, suggests that great promise lies in addressing more complex questions through behavioral genetic paradigms. In terms of future goals it is suggested that: (a) more behavioral genetic work of all types should be done—including replications and expansions of preliminary studies already in print; (b) work should focus on fine-grained, theory-based phenotypes with research designs that can address complex questions in language development; and (c) work in this area should utilize a variety of samples and methods (e.g., twin and family samples, heritability and segregation analyses, linkage and association tests, etc.).


1976 ◽  
Vol 21 (7) ◽  
pp. 497-498
Author(s):  
STANLEY GRAND

2014 ◽  
Vol 24 ◽  
pp. 47-52
Author(s):  
Joanna Putz-Leszczynska

This paper addresses template ageing in automatic signature verification systems. Handwritten signatures are a behavioral biometric sensitive to the passage of time. The experiments in this paper utilized a database that contains signature realizations captured in three sessions. The last session was captured seven years after the first one. The results presented in this paper show a potential risk of using an automatic handwriting verification system without including template ageing Purchase Article for $10 


Sign in / Sign up

Export Citation Format

Share Document