Use of an Adaptive Neuron Network in the Voice Authentication System

2006 ◽  
Vol 65 (5) ◽  
pp. 427-439
Author(s):  
O. N. Katkov ◽  
V. A. Pimenov ◽  
A. P. Ryzhkov
2013 ◽  
Vol 339 ◽  
pp. 143-146
Author(s):  
Wei Li

When the control object complicate conventional PID control accuracy will be significantly reduced. In recent years, with the gradual improvement of the people of artificial intelligence theory, analog neural networks has been rapid development, the emergence of a large number of excellent algorithm and the means of achieving, from single neuron PID algorithm and with gain control neuron system PID algorithm, two aspects discusses the process of adaptive neuron PID algorithm to achieve accuracy improved adaptive neuron system controller PID algorithm based on this analysis.


2022 ◽  
pp. 61-77
Author(s):  
Jie Lien ◽  
Md Abdullah Al Momin ◽  
Xu Yuan

Voice assistant systems (e.g., Siri, Alexa) have attracted wide research attention. However, such systems could receive voice information from malicious sources. Recent work has demonstrated that the voice authentication system is vulnerable to different types of attacks. The attacks are categorized into two main types: spoofing attacks and hidden voice commands. In this chapter, how to launch and defend such attacks is explored. For the spoofing attack, there are four main types, such as replay attacks, impersonation attacks, speech synthesis attacks, and voice conversion attacks. Although such attacks could be accurate on the speech recognition system, they could be easily identified by humans. Thus, the hidden voice commands have attracted a lot of research interest in recent years.


2019 ◽  
Vol 8 (4) ◽  
pp. 3078-3084

The guard segment considers security usage as the essential and critical errand to be executed so usage ought to be made with more concern. One of the ideal arrangements is Voice for upgrading the security framework in which the confirmation of clients is performed with the guide of their voice signals. This confirmation has been performed by actualizing Security Voice Authentication System (SVAS) strategy in our past work. Be that as it may, this philosophy isn't a lot of viable on the insider aggressors. The security framework would be separated by the vindictive/narrow-minded clients as they go about as genuine clients by transmitting the voice sign of unique clients. This deficiency can be overwhelmed by presenting a procedure called Two Level Voice Authentication System (TLVAS). This examination includes producing mystery keys at first by methods for arbitrary qualities inputted by the client. It will give security in the two-level procedure which incorporates the respectability of the handling ought to be solid. The sign must be changed over which control the figuring techniques. This strategy is seen as increasingly powerful against the insider assailants by avoiding the Compromisation created by them. Installing procedure used to execute for doing the exhibition investigation and the examination is completed by methods for expanded security level.


2013 ◽  
Vol 475-476 ◽  
pp. 388-393
Author(s):  
Ping Zhou ◽  
Jing Jing Ke ◽  
Xin Xing Jing ◽  
Zhao Guo Cui

Deliberate imitation which is the reproduction of another speakers voice and speech behavior can pose a threat to the security of the voice authentication system. Therefore effective characteristic parameters are the key to the anti-deliberate imitation. The study chose speech database of anti-deliberate imitation and investigated some common feature parameters separating capacity and descriptive power against voice deliberate imitation. The study compared the ranking of subjective evaluation and feature parameters Euclidean distance of imitators. The comparison results indicate that Mel frequency cepstrum coefficient (MFCC) combined with its differential cepstrum parameters (WMFCC) have the best performance for anti-deliberate imitation. And the results were validated by the experiment based on VQ speaker verification system.


1984 ◽  
Vol 15 (1) ◽  
pp. 51-57
Author(s):  
Sandra Q. Miller ◽  
Charles L. Madison

The purpose of this article is to show how one urban school district dealt with a perceived need to improve its effectiveness in diagnosing and treating voice disorders. The local school district established semiannual voice clinics. Students aged 5-18 were referred, screened, and selected for the clinics if they appeared to have a chronic voice problem. The specific procedures used in setting up the voice clinics and the subsequent changes made over a 10-year period are presented.


Sign in / Sign up

Export Citation Format

Share Document