Now a day’s wide offered facilities of telephones, mobiles associated tape recorders, tablets, laptops, PCs along with installed Apps, TVs etc lead to the misuse of the device and so creating them an efficient tool in service of criminal offences like bank account hacking, kidnapping, blackmail threats, terrorist calls, etc. The criminals have seen the chance for misuse of the varied modes of communication of voice. Therefore, speaker verification is now widely known technology of speech processing. Speaker verification uses the speaker voice samples to verify the claimed identity for authentication. If the speaker claims for certain identity and the voice of speaker is used to verify this claim, is called speaker verification or authentication. This can be either text-dependent or text-independent. It consists of two Modules: Training Module and Testing Module. This article discusses the MFCC technique for extracting features from the input voice samples. Here, simulation results are shown for single frame in MATLAB-13.0.
Loading....