Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
World Applied Sciences Journal
…
5 pages
1 file
Voice recognition is the process of taking the spoken word as an input to a computer program. This process is important to virtual reality because it provides a fairly natural and intuitive way of controlling the simulation while allowing the user's hands to remain free. This paper will delve into the uses of voice recognition in the field of virtual reality, examine how voice recognition is accomplished and list the academic disciplines that are central to the understanding and advancement of voice recognition technology. In order to recognize the spoken word and the person who spoke the word some estimating parameters were chosen and calculated to form voice fingerprint. The calculated values of voice fingerprint parameters then were passed to artificial neural networks, it was shown that using parameters values achieve high recognition rate, thus identifying the spoken word and the speaker.
Proceedings of the 2015 International Industrial Informatics and Computer Engineering Conference, 2015
Appling the speech recognition technology into the virtual reality system can not only expand the application of speech recognition in scene roaming, but also make up the shortage of the interaction of virtual reality software, and improve the efficiency of interaction between users and the virtual environment. This paper aims to combine the speech recognition technology with the VR technology, and control the users' viewpoint in the VR system by speech. Using Microsoft Speech SDK5.1, the speech recognition program is developed and the interface is designed to connect the speech recognition module with the VR software. Based on the EON SDK, the EON nodes of speech recognition and scene roaming are programmed. The above EON nodes and the built models are imported into EON. Running the speech recognition program and then the scene roaming controlled by speech is realized eventually. The experiment on walking mazement shows that the speech commands can exactly control the users' motion to avoid obstacles and successfully go through the mazement.
2018
In this paper, we provide a concise overview for the user identification using his biometric featurespeech. Voice processing has multiple fields of research and is widely used in many applications. Speaker recognition to identify user is a complex process in which various techniques (feature extraction, feature matching, and identification) is used to match varied characteristics of voice between training and testing data to identify the user. This paper aims to discuss efficient method to implement the identification of user on basis of their biometric featurespeech.
Journal 4 Research - J4R Journal, 2017
Voice recognition system is a system which is used to convert human voice into signal, which can be understood by the machines. When this is achieved, the machine can be made to work, as desired. The machine could be a computer, a typewriter, or even a robot. There are systems available, in which the machine 'speaks' the recorded word. But that is out of the scope of this paper. Here, only the human is expected to talk. Further, the voice recognition systems described here, can be used for projects only.
Communications of the ACM, 2000
Since September 11, 2001 there has been a sharp increase in the use of biometric-based security, including speaker authentication. Some of the guidelines for developing usable speaker-authentication dialogs correspond to basic principles that apply to the design of good speech-recognition interactions. Developing effective speaker-authentication dialogs for security also demands attention to considerations that are distinct from -and sometimes contrary to -those used for speech recognition.
Human Computer Interaction (HCI) summarizes research and engineering activities related to the communication between human beings and all sorts of "computerized" machines. Within this domain, substantial amount of work is dedicated to the idea of using the human voice as a natural interface for accessing computer systems. The VRIO speech processing unit represents one example of such an interface, where users control the machine via spoken commands. While the application of VRIO was originally intended for Virtual Reality (VR) environments only, a major redesign of VRIO's architecture allows its application to arbitrary scenarios, e.g. within ubiquitous and pervasive environments. This paper describes the revised architecture of VRIO as well as examples of its application in VR environments and for real-world scenarios.
International journal of applied engineering and management letters, 2022
Biometric trends are used in many systems because of security aspects. The cryptosystem is such an example which uses a biometric. But due to stored biometric data for the authentication, this can be a dangerous issue. Therefore, in comparison to conventional used biometric system, voice biometric system provides an efficient safety, security and unique identity. Among various speech recognition or processing methods, there is one called automated speech conversion methods, which also used to convert the recorded voice into text format. The overall concept of voice reorganization and voice biometric system is based on the acoustic modelling. Therefore, for getting the perfect speech detection, robust acoustic modelling is required. Our analysis describes the advancement and usage of voice biometric system for user identification and authentication. This paper provides a descriptive review of different voice biometric systems, their advancement and applications in different fields. Methodology: The core principles of the research issue have been well discussed in the literature review on speech biometrics. During this process, selected journals from a variety of secondary data sources, such as research papers published in a variety of reputed journals periodicals that are related to the topic are studied in the methodology. Findings/Result: A vocal biometric system is a biological system that captures an individual's voice and assigns it a unique characteristic for authentication purposes. This speech biometric method is primarily used to provide secure, quick, and frictionless access to various electronic devices. In the last three years, rapid technological advancements in neural networks have improved the deployment of speech biometric systems in a variety of industries. The majority of speech biometric system designs are based on the CPU, necessary power, and memory concepts. The advancement of software and hardware interface has been dramatically enhanced and implemented for many applications in the last few years, including smart watches, mobile phones, and car locking systems, where the interface between humans and electronics devices is critical. Banking security, attendance system, file access system, security control, and forensic development system are some of the other commercial applications. Originality: Following the literature study, the findings were utilized to conclude that, despite advances in biometric technology, there is still a significant gap in practical application, particularly for voice biometric systems. When building and developing a voice biometric system, it is necessary to integrate it with an IoT system. Paper Type: Literature Review.
2012
Voice biometrics for user authentication is a task in which the goal is to perform convenient, robust and secure authentication of speakers. In this work we investigate the use of state-of-theart text-independent and text-dependent speaker verification technology for user authentication. We evaluate three different authentication conditions: global digit strings, speaker specific digit stings and prompted digit strings. Harnessing the characteristics of the different types of conditions can provide benefits such as authentication transparent to the user (convenience), spoofing robustness (security) and improved accuracy (reliability). The systems were evaluated on a corpus collected by Wells Fargo Bank which consists of 750 speakers. We show how to adapt techniques such as joint factor analysis (JFA), i-vectors, Gaussian mixture models with nuisance attribute projection (GMM-NAP) and hidden Markov models with NAP (HMM-NAP) to obtain improved results for new authentication scenarios ...
Producers of computer devices very often fit their products with functions, which can be used by persons with some inefficiency. Such conveniences can be applied for blind or partially sighted users or for persons with limb paresis. The application shou ld be user-friendly with wide spectrum of adjusts. Computer users have wide choice of software speech analysers and synthesisers that may help them during working on computer. In this paper Microsoft Windows application with firmware MSAA technology is proposed. In such program all applica tion events by means of user's voice are controlled . Practical, investigations of voice recognition have also been presented.
Journal of Information Technology and Applications, 2012
Modern communication relies increasingly more on the verbal communication between a machine and a human, aiming to govern certain resources and robots, increase the security of certain means, initiate certain processing protocols, faster financial transactions... This paper illustrates the possibility of using the voice biometrics in modern living, from simple examples, such as starting the motor of a vehicle, through opening security gates, to proving fraud and embezzlement. Special emphasis has been put on the systems of automatic speaker identification and forensic speaker recognition.
2006
Abstract Biometric characteristics can be utilized in order to enable reliable and robust-to-impostor-attacks person recognition. Speaker recognition technology is commonly utilized in various systems enabling natural human computer interaction. The majority of the speaker recognition systems rely only on acoustic information, ignoring the visual modality.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Communications in Computer and Information Science, 2010
IEEE Transactions on Industrial Electronics, 2007
Inżynieria Bezpieczeństwa Obiektów Antropogenicznych, 2023
2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence), 2014
International Journal of Signal Processing, Image Processing and Pattern Recognition
Carpathian Journal of Electronic and Computer Engineering, 2021