![]() Proc Consortium Speech Technol Conjunct Conf Speaker Recognition Man Mach Direct Forensic: 9–22 Rodman (1998) Speaker recognition of disguised voices: a program for research. Dubey (2016) Isolated word recognition using HMM for Maithili dialect,” IEEE. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Proc IEEE Int Workshop Speaker Lang Recognit: 1–4 Künzel HJ, Gonzalez-Rodriguez J, Ortega-García J (2004).Effect of voice disguise on the performance of a forensic automatic speaker recognition system. Kiang MY (2003) A comparative assessment of classification methods. Proc IEEE Int Workshop Speaker Lang Recognit: 1–6 A study of intentional voice modifications for evading automatic speaker recognition. Kajarekar SS, Bratt H, Shriberg E, de Leon R (2006). Kajarekar SS, Ferrer L, Shriberg E, Sonmez K, Stolcke A, Venkataraman A (2005) SRI’s 2004 NIST speaker recognition evaluation system. Jingxu C, Hongchen Y, Zhanjiang S (2004) The speaker automatic identified system and its forensic application. IEEE international conference on acoustics, speech and signal processing (ICASSP), 3016–3017 Blind detection of electronic disguised voice. Haojun Wu, Yong Wang & Jiwu Huang (2013). IEEE Trans Audio Speech Lang Process 16(6):1097–1111 Grimaldi M, Cummins F (2008) Speaker identification using instantaneous frequencies. ![]() ![]() IEEE Int Workshop Speaker Language Recognit: 1–8 Gonzalez-Rodriguez J, Ramos-Castro D, Garcia-Gomar M, Ortega-Garcia J (2004) On robust estimation of likelihood ratios: the ATVs-UPM system at 2003 NFI/TNO forensic evaluation. Proc IE E 69(3):300–331Įntezari-Maleki R, Rezaei A, Minaei-Bidgoli B (2009) Comparison of classification methods based on the type of attributes and sample size. Audacity: free audio editor and recorder " in Ĭrochiere RE, Rabiner LR (1981) Interpolation and decimation of digital signals-a tutorial review. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |