A Novel Voice Authentication Using Hidden Markov Model (HMM)

Authors:

K. Anita Davamani,Sangeetha.S,

DOI NO:

https://doi.org/10.26782/jmcms.spl.2019.08.00013

Keywords:

HMM,wavelet transform,

Abstract

Hidden Markov Model (HMM) is a characteristic and profoundly hearty measurable technique or programmed voice check. The ordinary sign dealing with strategies envision that the sign ought to be stationary and are inadequate in observing non stationary standard, for example, the voice signals. The voice check framework consolidating the pre-accentuation, begin/end point identification, include extraction and vector quantization. Gee is utilized both in preparing procedure and check process. The info discourse sign is pre-underlined to wipe out the foundation clamor and to improve higher recurrence parts. For this reason a first request high pass FIR channel was utilized. Begin and end point identification of the ideal discourse sign must be finished. For this reason decrease calculation is utilized. At that point the Mel cepstrum is utilized to get an awesome voice check framework. The Mel cepstral coefficients got from each must mapped to a solitary point. For this reason vector quantization is utilized. This is used in HMMA Hidden Markov Model is a Finite State Machine having a fixed number of states. It is a quantifiable procedure for delineating the ghastly properties of the edges of a point of reference. The verified weakness of the HMM is that the trade can be all around depicted as a parametric energetic philosophy and that the parameters of the stochastic system can be considered in a particularly outlined way. Gee is a doubly installed stochastic procedure with a hidden stochastic procedure that isn't straightforwardly recognizable, yet can be watched distinctly through another arrangement of stochastic procedures that produce the grouping of perceptions. The layout technique for discourse acknowledgment experiences the time arrangement issue. DTW takes care of this issue by utilizing Dynamic Programming. Nonetheless, the format approach did not depend on factual sign displaying in an exacting sense.

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet”. Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya, N.,Sridhar,J.,Sriram, M.“Vehicularcloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download