Speaker authentication system using soft computing approaches

Speaker authentication has been developed rapidly in the last few decades. This research work attempts to extract the hidden features of human voice that is able to simulate human auditory system characteristics in speaker authentication. The hidden features are then presented as inputs to a Multi-L...

Full description

Bibliographic Details
Main Authors: Abdul Rahman, Abdul Wahab, See Ng, Goek, Dickiyanto, Romy
Format: Article
Language:English
Published: Elsevier 2005
Subjects:
Online Access:http://irep.iium.edu.my/38183/
http://irep.iium.edu.my/38183/
http://irep.iium.edu.my/38183/1/Speaker_authentication_system_using_soft_computing_approaches.pdf