Using a predefined passphrase to evaluate a speaker verification system

This article presents a standardized and repeatable process used to evaluate the performance of a speaker verification system.Through the use of a common passphrase and a subset of extracted feature vectors that outperforms other combinations, thestudy limits the exposure to potential experimental flaws, while measuring true biometric performance more effectively thanexisting evaluation methodologies. After collecting a dataset of 33 participants, the researchers achieved a performance rate of99.8% for the 22 users who contributed at least 20 text-dependent samples. The primary focus of the research, however, was toillustrate a variety of testing techniques that can be used to efficiently analyze the performance of a speaker verification systemand advocate the use of a common passphrase in this process.

[1]  Alvin F. Martin,et al.  NIST 2008 speaker recognition evaluation: performance across telephone and room microphone channels , 2009, INTERSPEECH.

[2]  James H. Martin,et al.  Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition , 2000 .

[3]  Virginia Teller Review of Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition by Daniel Jurafsky and James H. Martin. Prentice Hall 2000. , 2000 .

[4]  Giovanni Di Crescenzo,et al.  Modeling cryptographic properties of voice and voice-based entity authentication , 2007, DIM '07.

[5]  Andreas Stolcke,et al.  Modeling prosodic feature sequences for speaker recognition , 2005, Speech Commun..

[6]  Yong Gu,et al.  An implementation and evaluation of an on-line speaker verification system for field trials , 1998, ICSLP.

[7]  James H. Martin,et al.  Speech and language processing: an introduction to natural language processing , 2000 .

[8]  Roy A. Maxion Making Experiments Dependable , 2011, Dependable and Historic Computing.

[9]  Daniel Jurafsky,et al.  Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition, 2nd Edition , 2009, Prentice Hall series in artificial intelligence.

[10]  M. Wagner,et al.  An Evaluation of "Commercial Off-The-Shelf" Speaker Verification Systems , 2006, 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop.

[11]  Larry P. Heck,et al.  Phonetic class-based speaker verification , 2003, INTERSPEECH.

[12]  Luo Jun,et al.  Spectral Subtraction Speech Enhancement Technology Based on Fast Noise Estimation , 2009, 2009 International Conference on Information Engineering and Computer Science.

[13]  Bin Ma,et al.  Text-dependent speaker verification: Classifiers, databases and RSR2015 , 2014, Speech Commun..

[14]  Sung-Hyuk Cha,et al.  Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input , 2013, 2013 European Intelligence and Security Informatics Conference.

[15]  D. Reynolds Automatic Speaker Recognition Using Gaussian Mixture Speaker Models , 1995 .

[16]  Sebastian Möller,et al.  On the need for different security methods on mobile phones , 2011, Mobile HCI.

[17]  T. Kato,et al.  Improved speaker, verification over the cellular phone network using phoneme-balanced and digit-sequence-preserving connected digit patterns , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..