1、附录 A 英文文献 Speaker Recognition By Judith A. Markowitz, J. Markowitz Consultants Speaker recognition uses features of a persons voice to identify or verify that person. It is a well-established biometric with commercial systems that are more than 10 years old and deployed non-commercial systems that a
2、re more than 20 years old. This paper describes how speaker recognition systems work and how they are used in applications. 1. Introduction Speaker recognition (also called voice ID and voice biometrics) is the only human-biometric technology in commercial use today that extracts information from so
3、und patterns. It is also one of the most well-established biometrics, with deployed commercial applications that are more than 10 years old and non-commercial systems that are more than 20 years old. 2. How do Speaker-Recognition Systems Work Speaker-recognition systems use features of a persons voi
4、ce and speaking style to: attach an identity to the voice of an unknown speaker verify that a person is who she/ he claims to be separate one persons voice from other voices in a multi-speaker environment The first operation is called speak identification or speaker recognition; the second has many
5、names, including speaker verification, speaker authentication, voice verification, and voice recognition; the third is speaker separation or, in some situations, speaker classification. This papers focuses on speaker verification, the most highly commercialized of these technologies. 2.1 Overview of
6、 the Process Speaker verification is a biometric technology used for determining whether the person is who she or he claims to be. It should not be confused with speech recognition, a non-biometric technology used for identifying what a person is saying. Speech recognition products are not designed
7、to determine who is speaking. Speaker verification begins with a claim of identity (see Figure A1). Usually, the claim entails manual entry of a personal identification number (PIN), but a growing number of products allow spoken entry of the PIN and use speech recognition to identify the numeric cod
8、e. Some applications replace manual or spoken PIN entry with bank cards, smartcards, or the number of the telephone being used. PINS are also eliminated when a speaker-verification system contacts the user, an approach typical of systems used to monitor home-incarcerated criminals. Figure A1. Once t
9、he identity claim has been made, the system retrieves the stored voice sample (called a voiceprint) for the claimed identity and requests spoken input from the person making the claim. Usually, the requested input is a password. The newly input speech is compared with the stored voiceprint and the r
10、esults of that comparison are measured against an acceptance/rejection threshold. Finally, the system accepts the speaker as the authorized user, rejects the speaker as an impostor, or takes another action determined by the application. Some systems report a confidence level or other score indicating how confident it about its decision.