Confidence Measures: how much we can trust our speech recognizers

Size: px
Start display at page:

Download "Confidence Measures: how much we can trust our speech recognizers"

Transcription

1 Confidence Measures: how much we can trust our speech recognizers Prof. Hui Jiang Department of Computer Science York University, Toronto, Ontario, Canada

2 Outline Speech recognition in multimedia communications Confidence Measures: overviews Confidence Measure as Utterance Verification The conventional method: anti-models Our proposed approaches: Approach 1: to use accurate competing models Approach 2: nested neighborhood in HMM model space Conclusions

3 Speech Recognition in Multimedia Communications (I): server side Desktops The Internet (IP) Laptops Multimedia servers PDA Communication servers Server side Telephone Networks (3G) Multimedia Content Analysis: Audio/Video Segmentation Speech Transcription Text Understanding Speaker/Topic Identification Speech/Audio/Video Indexing Audio Mining Telephone Mobile phone

4 Multimedia Content Analysis for Information retrieval Multimedia stream (documents) Media Separation Video Audio Text Audio Segmentation Language Understanding speech speech Audio Speech Recognition Text Speaker Identification Semantics Content Speaker ID Video Processing Video Synchronization and Indexing Index for information retrieval

5 Speech Recognition in Multimedia Communications (II): client side Desktops Multimedia servers Communication servers The Internet (IP) Telephone Networks (3G) Natural User Interface: Speech input/output Multi-modal interface Dialog systems Intelligent agent Intelligent Agent Laptops PDA Telephone Mobile phone End User Side (client side)

6 Intelligent Agent Context Tracking Speech Recognition Speech Input Multimedia servers Dialogue Manager Domain Knowledge Language Understanding Response Generation Text-to-speech Synthesis Text Input Text Output Speech Output Users Key Issues: Robust speech recognition Spoken language understanding Dialogue modeling

7 Speech Recognition: state-of-the-art The technology allows us to easily build a state-of-the-art speech system for a variety of applications. Not an issue to build a system if given: Large training corpus (in-house, LDC for public, etc.) Software tools (HTK, etc.) There exist many demo systems; few practically used in-field Most speech recognition systems are not usable in practice Reasons: vulnerable to various interferences (noises, accent, etc.) not stable not reliable Not friendly to non-expert users

8 A Few Examples from the DARPA Communicator system User: do they have a flight that leaves earlier in the day Recognizer: in have flight that is earlier mid-day User: i cannot continue this conversation Recognizer: i not continue this comfort-inn User: Recognizer: my starting location is Fort-Wayne Indiana my starting location is four morning Indiana

9 Improve Usability of Speech Recognition Systems Robust Speech Recognition Make the system more robust in practical applications Confidence Measures Attach each recognized word a score to indicate its reliability in recognition Focus on words with high scores; discard low-score words Detect and correct recognition errors Reject out-of-vocabulary words used by non-expert users Selectively interpret recognition results

10 Previous Examples with confidence measure attached User: do they have a flight that leaves earlier in the day Recognizer: in (0.43) have (0.65) flight (0.83) that (0.34) is (0.27) earlier (0.76) mid-day (0.12) User: i cannot continue this conversation Recognizer: i (0.91) not (0.69) continue (0.87) this (0.79) comfort-inn (0.16) User: Recognizer: my starting location is Fort-Wayne Indiana my(0.74) starting(0.92) location(0.83) is(0.78) four(0.31) morning(0.06) Indiana(0.90)

11 How to calculate confidence measures (CM) for speech recognition CM as a combination of predictor features CM as a posterior probability CM as utterance verification

12 Speech & Audio Processing sliding window waveform Feature Extraction (Linear Prediction, Filter Bank) Feature vectors Audio/speech coding bit stream for transmission Audio Segmentation speech/music/noise Speech Recognition words

13 Automatic Speech Recognition X speech feature vectors Acoustic Matching h r y U P phoneme sequence Language Matching How are you? W word sequence Acoustic Models Language Models W = argmaxpr( W W W Hidden Markov Models (HMM s) = argmaxpr( X X) = P, W) Pr( W) Markov Chain (N-gram) arg max W Pr( X W ) Pr( W Pr( X ) )

14 CM as Utterance Verification waveform How are you? Recognition Results H r y U Phoneme sequence Λ H Λ W Λ@ Λr Λ y ΛU

15 Verify every phoneme segment Assume one speech segment Xi is recognized as represented by HMM Verify the decision under the framework of statistical hypothesis testing H0: Xi is truly from VS. H1: Xi is not from Solution is Likelihood Ratio (LR) Testing: LR = Pr( X Pr( X i i H H 0 1 ) ) >η

16 Problem: how to calculate the denominator For the numerator in LR testing: Pr( X i H l( X What about the denominator? ) 0 i Λ@ H1 is not easy to model, is a composite hypothesis which includes so many possibilities: ) a) Xi from another phoneme rather b) Xi is speech sound not in the phoneme set c) Xi is a non-speech noise d) None of the above

17 The conventional method: using anti-models For each phoneme a, estimate an anti-model using all training data which are not from the phoneme. The anti-model is a HMM having the same structure as Every phoneme a has two models: Regular recognition model An anti-model Λ a Λ a Λ a Λ a In previous example: LR i = l( X l( X i i ) ) >η LRi can be used as a confidence measure for this speech segment.

18 New verification method based on accurate competing models (I) If we can t enumerate and model all situations in H1, approximate it with only the most significant one. a. Xi from another phoneme rather 1) Xi from competing models 2) Xi from non-competing models b. Xi is speech sound not in the phoneme set c. Xi is a non-speech noise d. None of the above In most cases, especially when Xi was misrecognized, the probability in the case a.1) dominates the total probability in H1, i.e., Pr( X i H1).

19 How to formulate the competing models Competing tokens of a is defined as all data segments (in training set) which are mis-recognized during recognition. For any HMM, we have two sets: The true token set: St( ) The competing token set: Sc( ) Given the decision: data X is recognized as H0: X is truly from model VS. H1: X is not from model H 0: X S t (Λ) H 1: X S c (Λ) LR Pr(X H Pr(X H 1 ) ) Pr( X Pr( X S S ( Λ)) ( Λ)) p( X p( X λt ) λ ) 0 t = = = Competing c c model

20 In-Search Data Selection method $-b-u b-u-k u-k+t k-t+i T-i+s i-s+t s-t+r T-r+i r-i+p i-p+$ Reference Segmentation State search beam Token Selection phone a-b+c phone a-b+c a-b+c phone a -b +c phone a -b +c A word-ending active path t True Token Sets Competing Token Sets Time

21 New Verification method based on nested neighborhood in model space Original model Competing model Other models Tight Neighborhood 1 Medium Neighborhood 2 Large Neighborhood 3 HMM Model Space

22 Verification based on nested neighborhood in model space (II) Given the decision: data X is recognized as H0: X is truly from model VS. H1: X is not from model H0: true model of X lies in small neighborhood s VS. H1: true model of X lies in the region b s Small Neighborhood s Big Neighborhood b

23 Verification based on nested neighborhood in model space (III) Bayes factors: the tool to implement the verification BF = Λ b Λ S Λ l( X λ) ρ λ λ s ( ) d > η l( X λ) ρ ( λ) dλ S b Model is viewed as random variable in model space l(x ) is the likelihood function of any speech data X s( ) is the prior distribution of inside neighborhood s b( ) is the prior distribution of in the region b s

24 Specify Neighborhoods and Priors (I) A parametric neighborhood: (C, ) neighborhood: Λ ( c, ρ ) * ( λ ) = { λ m * ikd Cd 1 d ρ m m * ikd + Cd 1 d ρ } Use a small (C1, 1) for small neighborhood s Same for all Gaussian components in all HMMs Use a large (C2, 2) for big neighborhood b Same for all Gaussian components in all HMMs Priors: constrained uniform pdf in neighborhood Tune C1, 1, C2, 2 (C1<C2, 1< 2) for best performance

25 Specify Neighborhoods and Priors (II) A non-parametric neighborhood: Define -function priors: λ 2 λ 1 λ 3 Λ * λ λ 5 λ 4 1 ρ ( λ) = Λ δ ( λ λi ) N λ Λ i BF calculation is simplified: BF = λ Λ i λ Λ i s b l( X l( X λ ) / i λ ) / i N N s b

26 Experiments Tested on Bell Labs Communicator system for the DAPAR communicator project. (a travel reservation task) Use confidence measure to detect recognition errors from the recognition results given by our best recognizer. The best recognition performance: 15.8% word error rate Verify correctly recognized words vs. mis-recognized words For each utterance, calculate confidence measure for every recognized phoneme, then combine for each word. Baseline: Likelihood Ratio Testing based on anti-models New approach 1: Likelihood Ratio Testing based on competing models New Approach 2: Bayes factors based on nested neighborhoods

27 Experimental Results of new approach 1: ROC curves ROC curves in test set Eva00 with three different verification models std anti mono new mono new tri False Alarm Rate False Rejection Rate

28 Experimental results of new approach 1: equal error rate (EER) Method baseline New Approach 1 (mono-phone model) New Approach 1 (tri-phone model) Equal Error Rate (EER) 40.0% 27.3% 24.6%

29 Experimental results of new approach 2: ROC curves Comparison of ROC curves Baseline (Anti models) (C,p) neighborgood Delta Neighborgood (N=1500) Dist2C neighborhood 0.7 False Acceptance False Rejection

30 Experimental results of new approach 2: equal error rate (EER) Method baseline Parametric neighborhood (global) Parametric neighborhood (state-dependent) Non-parametric neighborhood (case A) Non-parametric neighborhood (case B) Equal Error Rate (EER) 40.0% 36.7% 32.4% 31.5% 31.0%

31 Conclusions Reliable confidence measures (CM) play a key role in building a successful speech recognition system. Utterance verification is a good framework to calculate confidence measures (CM). We proposed two new approaches for CM calculation By using accurate competing models Based on neighborhood information in HMM space and Bayes factors. The new approaches are proved to outperform the conventional method based on anti-models. Future works: How to interpret H1 in other ways In approach 2, how to define a good neighborhood quantitatively in high-dimension HMM model space

32

33 ERROR: undefined OFFENDING COMMAND: STACK:

Spoken Term Detection Using Multiple Speech Recognizers Outputs at NTCIR-9 SpokenDoc STD subtask

Spoken Term Detection Using Multiple Speech Recognizers Outputs at NTCIR-9 SpokenDoc STD subtask NTCIR-9 Workshop: SpokenDoc Spoken Term Detection Using Multiple Speech Recognizers Outputs at NTCIR-9 SpokenDoc STD subtask Hiromitsu Nishizaki Yuto Furuya Satoshi Natori Yoshihiro Sekiguchi University

More information

Client Dependent GMM-SVM Models for Speaker Verification

Client Dependent GMM-SVM Models for Speaker Verification Client Dependent GMM-SVM Models for Speaker Verification Quan Le, Samy Bengio IDIAP, P.O. Box 592, CH-1920 Martigny, Switzerland {quan,bengio}@idiap.ch Abstract. Generative Gaussian Mixture Models (GMMs)

More information

How accurate is AGNITIO KIVOX Voice ID?

How accurate is AGNITIO KIVOX Voice ID? How accurate is AGNITIO KIVOX Voice ID? Overview Using natural speech, KIVOX can work with error rates below 1%. When optimized for short utterances, where the same phrase is used for enrolment and authentication,

More information

Speech Technology Using in Wechat

Speech Technology Using in Wechat Speech Technology Using in Wechat FENG RAO Powered by WeChat Outline Introduce Algorithm of Speech Recognition Acoustic Model Language Model Decoder Speech Technology Open Platform Framework of Speech

More information

Manual operations of the voice identification program GritTec's Speaker-ID: The Mobile Client

Manual operations of the voice identification program GritTec's Speaker-ID: The Mobile Client Manual operations of the voice identification program GritTec's Speaker-ID: The Mobile Client Version 4.00 2017 Title Short name of product Version 4.00 Manual operations of GritTec s Speaker-ID: The Mobile

More information

2-2-2, Hikaridai, Seika-cho, Soraku-gun, Kyoto , Japan 2 Graduate School of Information Science, Nara Institute of Science and Technology

2-2-2, Hikaridai, Seika-cho, Soraku-gun, Kyoto , Japan 2 Graduate School of Information Science, Nara Institute of Science and Technology ISCA Archive STREAM WEIGHT OPTIMIZATION OF SPEECH AND LIP IMAGE SEQUENCE FOR AUDIO-VISUAL SPEECH RECOGNITION Satoshi Nakamura 1 Hidetoshi Ito 2 Kiyohiro Shikano 2 1 ATR Spoken Language Translation Research

More information

How to create dialog system

How to create dialog system How to create dialog system Jan Balata Dept. of computer graphics and interaction Czech Technical University in Prague 1 / 55 Outline Intro Architecture Types of control Designing dialog system IBM Bluemix

More information

Dynamic Time Warping

Dynamic Time Warping Centre for Vision Speech & Signal Processing University of Surrey, Guildford GU2 7XH. Dynamic Time Warping Dr Philip Jackson Acoustic features Distance measures Pattern matching Distortion penalties DTW

More information

Pattern Recognition. Kjell Elenius. Speech, Music and Hearing KTH. March 29, 2007 Speech recognition

Pattern Recognition. Kjell Elenius. Speech, Music and Hearing KTH. March 29, 2007 Speech recognition Pattern Recognition Kjell Elenius Speech, Music and Hearing KTH March 29, 2007 Speech recognition 2007 1 Ch 4. Pattern Recognition 1(3) Bayes Decision Theory Minimum-Error-Rate Decision Rules Discriminant

More information

Query-by-example spoken term detection based on phonetic posteriorgram Query-by-example spoken term detection based on phonetic posteriorgram

Query-by-example spoken term detection based on phonetic posteriorgram Query-by-example spoken term detection based on phonetic posteriorgram International Conference on Education, Management and Computing Technology (ICEMCT 2015) Query-by-example spoken term detection based on phonetic posteriorgram Query-by-example spoken term detection based

More information

CHAPTER 8 Multimedia Information Retrieval

CHAPTER 8 Multimedia Information Retrieval CHAPTER 8 Multimedia Information Retrieval Introduction Text has been the predominant medium for the communication of information. With the availability of better computing capabilities such as availability

More information

Speech User Interface for Information Retrieval

Speech User Interface for Information Retrieval Speech User Interface for Information Retrieval Urmila Shrawankar Dept. of Information Technology Govt. Polytechnic Institute, Nagpur Sadar, Nagpur 440001 (INDIA) urmilas@rediffmail.com Cell : +919422803996

More information

Speech Tuner. and Chief Scientist at EIG

Speech Tuner. and Chief Scientist at EIG Speech Tuner LumenVox's Speech Tuner is a complete maintenance tool for end-users, valueadded resellers, and platform providers. It s designed to perform tuning and transcription, as well as parameter,

More information

Evaluating Spoken Dialogue Systems. Julia Hirschberg CS /27/2011 1

Evaluating Spoken Dialogue Systems. Julia Hirschberg CS /27/2011 1 Evaluating Spoken Dialogue Systems Julia Hirschberg CS 4706 4/27/2011 1 Dialogue System Evaluation Key point about SLP. Whenever we design a new algorithm or build a new application, need to evaluate it

More information

Discriminative Training of Decoding Graphs for Large Vocabulary Continuous Speech Recognition

Discriminative Training of Decoding Graphs for Large Vocabulary Continuous Speech Recognition Discriminative Training of Decoding Graphs for Large Vocabulary Continuous Speech Recognition by Hong-Kwang Jeff Kuo, Brian Kingsbury (IBM Research) and Geoffry Zweig (Microsoft Research) ICASSP 2007 Presented

More information

CMU Sphinx: the recognizer library

CMU Sphinx: the recognizer library CMU Sphinx: the recognizer library Authors: Massimo Basile Mario Fabrizi Supervisor: Prof. Paola Velardi 01/02/2013 Contents 1 Introduction 2 2 Sphinx download and installation 4 2.1 Download..........................................

More information

Speaker Diarization System Based on GMM and BIC

Speaker Diarization System Based on GMM and BIC Speaer Diarization System Based on GMM and BIC Tantan Liu 1, Xiaoxing Liu 1, Yonghong Yan 1 1 ThinIT Speech Lab, Institute of Acoustics, Chinese Academy of Sciences Beijing 100080 {tliu, xliu,yyan}@hccl.ioa.ac.cn

More information

Speech Recognition Lecture 8: Acoustic Models. Eugene Weinstein Google, NYU Courant Institute Slide Credit: Mehryar Mohri

Speech Recognition Lecture 8: Acoustic Models. Eugene Weinstein Google, NYU Courant Institute Slide Credit: Mehryar Mohri Speech Recognition Lecture 8: Acoustic Models. Eugene Weinstein Google, NYU Courant Institute eugenew@cs.nyu.edu Slide Credit: Mehryar Mohri Speech Recognition Components Acoustic and pronunciation model:

More information

Introduction to HTK Toolkit

Introduction to HTK Toolkit Introduction to HTK Toolkit Berlin Chen 2003 Reference: - The HTK Book, Version 3.2 Outline An Overview of HTK HTK Processing Stages Data Preparation Tools Training Tools Testing Tools Analysis Tools Homework:

More information

Audio-Visual Speech Activity Detection

Audio-Visual Speech Activity Detection Institut für Technische Informatik und Kommunikationsnetze Semester Thesis at the Department of Information Technology and Electrical Engineering Audio-Visual Speech Activity Detection Salome Mannale Advisors:

More information

Implementing a Hidden Markov Model Speech Recognition System in Programmable Logic

Implementing a Hidden Markov Model Speech Recognition System in Programmable Logic Implementing a Hidden Markov Model Speech Recognition System in Programmable Logic S.J. Melnikoff, S.F. Quigley & M.J. Russell School of Electronic and Electrical Engineering, University of Birmingham,

More information

SPEECH FEATURE EXTRACTION USING WEIGHTED HIGHER-ORDER LOCAL AUTO-CORRELATION

SPEECH FEATURE EXTRACTION USING WEIGHTED HIGHER-ORDER LOCAL AUTO-CORRELATION Far East Journal of Electronics and Communications Volume 3, Number 2, 2009, Pages 125-140 Published Online: September 14, 2009 This paper is available online at http://www.pphmj.com 2009 Pushpa Publishing

More information

SAS: A speaker verification spoofing database containing diverse attacks

SAS: A speaker verification spoofing database containing diverse attacks SAS: A speaker verification spoofing database containing diverse attacks Zhizheng Wu 1, Ali Khodabakhsh 2, Cenk Demiroglu 2, Junichi Yamagishi 1,3, Daisuke Saito 4, Tomoki Toda 5, Simon King 1 1 University

More information

Spoken Document Retrieval (SDR) for Broadcast News in Indian Languages

Spoken Document Retrieval (SDR) for Broadcast News in Indian Languages Spoken Document Retrieval (SDR) for Broadcast News in Indian Languages Chirag Shah Dept. of CSE IIT Madras Chennai - 600036 Tamilnadu, India. chirag@speech.iitm.ernet.in A. Nayeemulla Khan Dept. of CSE

More information

Comparison of ROC-based and likelihood methods for fingerprint verification

Comparison of ROC-based and likelihood methods for fingerprint verification Comparison of ROC-based and likelihood methods for fingerprint verification Sargur Srihari, Harish Srinivasan, Matthew Beal, Prasad Phatak and Gang Fang Department of Computer Science and Engineering University

More information

ABSTRACT 1. INTRODUCTION

ABSTRACT 1. INTRODUCTION ABSTRACT A Framework for Multi-Agent Multimedia Indexing Bernard Merialdo Multimedia Communications Department Institut Eurecom BP 193, 06904 Sophia-Antipolis, France merialdo@eurecom.fr March 31st, 1995

More information

Weka ( )

Weka (  ) Weka ( http://www.cs.waikato.ac.nz/ml/weka/ ) The phases in which classifier s design can be divided are reflected in WEKA s Explorer structure: Data pre-processing (filtering) and representation Supervised

More information

Multiple target detection in video using quadratic multi-frame correlation filtering

Multiple target detection in video using quadratic multi-frame correlation filtering Multiple target detection in video using quadratic multi-frame correlation filtering Ryan Kerekes Oak Ridge National Laboratory B. V. K. Vijaya Kumar Carnegie Mellon University March 17, 2008 1 Outline

More information

evaluation techniques goals of evaluation evaluation by experts cisc3650 human-computer interaction spring 2012 lecture # II.1

evaluation techniques goals of evaluation evaluation by experts cisc3650 human-computer interaction spring 2012 lecture # II.1 topics: evaluation techniques usability testing references: cisc3650 human-computer interaction spring 2012 lecture # II.1 evaluation techniques Human-Computer Interaction, by Alan Dix, Janet Finlay, Gregory

More information

Variable-Component Deep Neural Network for Robust Speech Recognition

Variable-Component Deep Neural Network for Robust Speech Recognition Variable-Component Deep Neural Network for Robust Speech Recognition Rui Zhao 1, Jinyu Li 2, and Yifan Gong 2 1 Microsoft Search Technology Center Asia, Beijing, China 2 Microsoft Corporation, One Microsoft

More information

Andi Buzo, Horia Cucu, Mihai Safta and Corneliu Burileanu. Speech & Dialogue (SpeeD) Research Laboratory University Politehnica of Bucharest (UPB)

Andi Buzo, Horia Cucu, Mihai Safta and Corneliu Burileanu. Speech & Dialogue (SpeeD) Research Laboratory University Politehnica of Bucharest (UPB) Andi Buzo, Horia Cucu, Mihai Safta and Corneliu Burileanu Speech & Dialogue (SpeeD) Research Laboratory University Politehnica of Bucharest (UPB) The MediaEval 2012 SWS task A multilingual, query by example,

More information

Combining Neural Networks and Log-linear Models to Improve Relation Extraction

Combining Neural Networks and Log-linear Models to Improve Relation Extraction Combining Neural Networks and Log-linear Models to Improve Relation Extraction Thien Huu Nguyen and Ralph Grishman Computer Science Department, New York University {thien,grishman}@cs.nyu.edu Outline Relation

More information

Using Document Summarization Techniques for Speech Data Subset Selection

Using Document Summarization Techniques for Speech Data Subset Selection Using Document Summarization Techniques for Speech Data Subset Selection Kai Wei, Yuzong Liu, Katrin Kirchhoff, Jeff Bilmes Department of Electrical Engineering University of Washington Seattle, WA 98195,

More information

Niusha, the first Persian speech-enabled IVR platform

Niusha, the first Persian speech-enabled IVR platform 2010 5th International Symposium on Telecommunications (IST'2010) Niusha, the first Persian speech-enabled IVR platform M.H. Bokaei, H. Sameti, H. Eghbal-zadeh, B. BabaAli, KH. Hosseinzadeh, M. Bahrani,

More information

WORD LEVEL DISCRIMINATIVE TRAINING FOR HANDWRITTEN WORD RECOGNITION Chen, W.; Gader, P.

WORD LEVEL DISCRIMINATIVE TRAINING FOR HANDWRITTEN WORD RECOGNITION Chen, W.; Gader, P. University of Groningen WORD LEVEL DISCRIMINATIVE TRAINING FOR HANDWRITTEN WORD RECOGNITION Chen, W.; Gader, P. Published in: EPRINTS-BOOK-TITLE IMPORTANT NOTE: You are advised to consult the publisher's

More information

Smart Home Implementation Using Data Mining

Smart Home Implementation Using Data Mining www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8276-8280 Smart Home Implementation Using Data Mining Gayatri D. Kulkarni

More information

Pitch Prediction from Mel-frequency Cepstral Coefficients Using Sparse Spectrum Recovery

Pitch Prediction from Mel-frequency Cepstral Coefficients Using Sparse Spectrum Recovery Pitch Prediction from Mel-frequency Cepstral Coefficients Using Sparse Spectrum Recovery Achuth Rao MV, Prasanta Kumar Ghosh SPIRE LAB Electrical Engineering, Indian Institute of Science (IISc), Bangalore,

More information

Fuzzy and Markov Models for Keystroke Biometrics Authentication

Fuzzy and Markov Models for Keystroke Biometrics Authentication Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization, Beijing, China, September 5-7, 27 89 Fuzzy and Markov Models for Keystroke Biometrics Authentication DAT

More information

Inversion via Bayesian Multimodal Iterative Adaptive Processing (MIAP)

Inversion via Bayesian Multimodal Iterative Adaptive Processing (MIAP) Inversion via Bayesian Multimodal Iterative Adaptive Processing (MIAP) Leslie Collins, Yongli Yu, Peter Torrione, and Mark Kolba Electrical and Computer Engineering Duke University Work supported by DARPA/ARO

More information

Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data

Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data INTERSPEECH 17 August 24, 17, Stockholm, Sweden Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data Achintya Kr. Sarkar 1, Md. Sahidullah 2, Zheng-Hua

More information

Improving SVF with DISTBIC for Phoneme Segmentation

Improving SVF with DISTBIC for Phoneme Segmentation Improving SVF with DISTBIC for Phoneme Segmentation Joshua Winebarger, Khalid Daoudi, Hussein Yahia To cite this version: Joshua Winebarger, Khalid Daoudi, Hussein Yahia. Improving SVF with DISTBIC for

More information

Maximum Likelihood Beamforming for Robust Automatic Speech Recognition

Maximum Likelihood Beamforming for Robust Automatic Speech Recognition Maximum Likelihood Beamforming for Robust Automatic Speech Recognition Barbara Rauch barbara@lsv.uni-saarland.de IGK Colloquium, Saarbrücken, 16 February 2006 Agenda Background: Standard ASR Robust ASR

More information

SVD-based Universal DNN Modeling for Multiple Scenarios

SVD-based Universal DNN Modeling for Multiple Scenarios SVD-based Universal DNN Modeling for Multiple Scenarios Changliang Liu 1, Jinyu Li 2, Yifan Gong 2 1 Microsoft Search echnology Center Asia, Beijing, China 2 Microsoft Corporation, One Microsoft Way, Redmond,

More information

ON THE EFFECT OF SCORE EQUALIZATION IN SVM MULTIMODAL BIOMETRIC SYSTEMS

ON THE EFFECT OF SCORE EQUALIZATION IN SVM MULTIMODAL BIOMETRIC SYSTEMS ON THE EFFECT OF SCORE EQUALIZATION IN SVM MULTIMODAL BIOMETRIC SYSTEMS Pascual Ejarque and Javier Hernando TALP Research Center, Department of Signal Theory and Communications Technical University of

More information

Scott Shaobing Chen & P.S. Gopalakrishnan. IBM T.J. Watson Research Center. as follows:

Scott Shaobing Chen & P.S. Gopalakrishnan. IBM T.J. Watson Research Center.   as follows: SPEAKER, ENVIRONMENT AND CHANNEL CHANGE DETECTION AND CLUSTERING VIA THE BAYESIAN INFORMATION CRITERION Scott Shaobing Chen & P.S. Gopalakrishnan IBM T.J. Watson Research Center email: schen@watson.ibm.com

More information

Speech Recognition Systems for Automatic Transcription, Voice Command & Dialog applications. Frédéric Beaugendre

Speech Recognition Systems for Automatic Transcription, Voice Command & Dialog applications. Frédéric Beaugendre Speech Recognition Systems for Automatic Transcription, Voice Command & Dialog applications Frédéric Beaugendre www.seekiotech.com SeekioTech Start-up hosted at the multimedia incubator «la Belle de Mai»,

More information

JOINT INTENT DETECTION AND SLOT FILLING USING CONVOLUTIONAL NEURAL NETWORKS. Puyang Xu, Ruhi Sarikaya. Microsoft Corporation

JOINT INTENT DETECTION AND SLOT FILLING USING CONVOLUTIONAL NEURAL NETWORKS. Puyang Xu, Ruhi Sarikaya. Microsoft Corporation JOINT INTENT DETECTION AND SLOT FILLING USING CONVOLUTIONAL NEURAL NETWORKS Puyang Xu, Ruhi Sarikaya Microsoft Corporation ABSTRACT We describe a joint model for intent detection and slot filling based

More information

Combining Biometric Scores in Identification Systems

Combining Biometric Scores in Identification Systems 1 Combining Biometric Scores in Identification Systems Sergey Tulyakov and Venu Govindaraju, Fellow, IEEE Both authors are with the State University of New York at Buffalo. 2 Abstract Combination approaches

More information

How to Build Optimized ML Applications with Arm Software

How to Build Optimized ML Applications with Arm Software How to Build Optimized ML Applications with Arm Software Arm Technical Symposia 2018 ML Group Overview Today we will talk about applied machine learning (ML) on Arm. My aim for today is to show you just

More information

SOFTWARE DESIGN AND DEVELOPMENT OF MUTIMODAL INTERACTION

SOFTWARE DESIGN AND DEVELOPMENT OF MUTIMODAL INTERACTION SOFTWARE DESIGN AND DEVELOPMENT OF MUTIMODAL INTERACTION Marie-Luce Bourguet Queen Mary University of London Abstract: Key words: The multimodal dimension of a user interface raises numerous problems that

More information

Discriminative training and Feature combination

Discriminative training and Feature combination Discriminative training and Feature combination Steve Renals Automatic Speech Recognition ASR Lecture 13 16 March 2009 Steve Renals Discriminative training and Feature combination 1 Overview Hot topics

More information

WHO WANTS TO BE A MILLIONAIRE?

WHO WANTS TO BE A MILLIONAIRE? IDIAP COMMUNICATION REPORT WHO WANTS TO BE A MILLIONAIRE? Huseyn Gasimov a Aleksei Triastcyn Hervé Bourlard Idiap-Com-03-2012 JULY 2012 a EPFL Centre du Parc, Rue Marconi 19, PO Box 592, CH - 1920 Martigny

More information

COMP90051 Statistical Machine Learning

COMP90051 Statistical Machine Learning COMP90051 Statistical Machine Learning Semester 2, 2016 Lecturer: Trevor Cohn 20. PGM Representation Next Lectures Representation of joint distributions Conditional/marginal independence * Directed vs

More information

Using Gradient Descent Optimization for Acoustics Training from Heterogeneous Data

Using Gradient Descent Optimization for Acoustics Training from Heterogeneous Data Using Gradient Descent Optimization for Acoustics Training from Heterogeneous Data Martin Karafiát Λ, Igor Szöke, and Jan Černocký Brno University of Technology, Faculty of Information Technology Department

More information

Lecture 7: Neural network acoustic models in speech recognition

Lecture 7: Neural network acoustic models in speech recognition CS 224S / LINGUIST 285 Spoken Language Processing Andrew Maas Stanford University Spring 2017 Lecture 7: Neural network acoustic models in speech recognition Outline Hybrid acoustic modeling overview Basic

More information

Chapter 3: Supervised Learning

Chapter 3: Supervised Learning Chapter 3: Supervised Learning Road Map Basic concepts Evaluation of classifiers Classification using association rules Naïve Bayesian classification Naïve Bayes for text classification Summary 2 An example

More information

Julius rev LEE Akinobu, and Julius Development Team 2007/12/19. 1 Introduction 2

Julius rev LEE Akinobu, and Julius Development Team 2007/12/19. 1 Introduction 2 Julius rev. 4.0 L Akinobu, and Julius Development Team 2007/12/19 Contents 1 Introduction 2 2 Framework of Julius-4 2 2.1 System architecture........................... 2 2.2 How it runs...............................

More information

ITNP80: Multimedia! Sound-II!

ITNP80: Multimedia! Sound-II! Sound compression (I) Compression of sound data requires different techniques from those for graphical data Requirements are less stringent than for video data rate for CD-quality audio is much less than

More information

Car Information Systems for ITS

Car Information Systems for ITS Car Information Systems for ITS 102 Car Information Systems for ITS Kozo Nakamura Ichiro Hondo Nobuo Hataoka, Ph.D. Shiro Horii OVERVIEW: For ITS (intelligent transport systems) car information systems,

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

International Journal of Modern Trends in Engineering and Research   e-issn No.: , Date: 2-4 July, 2015 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Communication media for Blinds Based on Voice Mrs.K.M.Sanghavi 1, Radhika Maru

More information

Multifactor Fusion for Audio-Visual Speaker Recognition

Multifactor Fusion for Audio-Visual Speaker Recognition Proceedings of the 7th WSEAS International Conference on Signal, Speech and Image Processing, Beijing, China, September 15-17, 2007 70 Multifactor Fusion for Audio-Visual Speaker Recognition GIRIJA CHETTY

More information

IMPROVED SIDE MATCHING FOR MATCHED-TEXTURE CODING

IMPROVED SIDE MATCHING FOR MATCHED-TEXTURE CODING IMPROVED SIDE MATCHING FOR MATCHED-TEXTURE CODING Guoxin Jin 1, Thrasyvoulos N. Pappas 1 and David L. Neuhoff 2 1 EECS Department, Northwestern University, Evanston, IL 60208 2 EECS Department, University

More information

Web2cToGo: Bringing the Web2cToolkit to Mobile Devices. Reinhard Bacher DESY, Hamburg, Germany

Web2cToGo: Bringing the Web2cToolkit to Mobile Devices. Reinhard Bacher DESY, Hamburg, Germany Web2cToGo: Bringing the Web2cToolkit to Mobile Devices Reinhard Bacher DESY, Hamburg, Germany Outline Introduction to Web2cToolkit New: Web2cToGo project Web2cToGo Web-Desktop Web-Desktop navigation and

More information

Learning The Lexicon!

Learning The Lexicon! Learning The Lexicon! A Pronunciation Mixture Model! Ian McGraw! (imcgraw@mit.edu)! Ibrahim Badr Jim Glass! Computer Science and Artificial Intelligence Lab! Massachusetts Institute of Technology! Cambridge,

More information

User guide. Käyttöohje

User guide. Käyttöohje User guide Bedienungsanleitung Guide d utilisation Manual del usuario Guia do utilizador Istruzioni d uso Gebruikersshandleiding Brugsanvisning Bruksanvisning Käyttöohje UK D F ES P I NL DK SE FIN 2 12

More information

Speech-based Information Retrieval System with Clarification Dialogue Strategy

Speech-based Information Retrieval System with Clarification Dialogue Strategy Speech-based Information Retrieval System with Clarification Dialogue Strategy Teruhisa Misu Tatsuya Kawahara School of informatics Kyoto University Sakyo-ku, Kyoto, Japan misu@ar.media.kyoto-u.ac.jp Abstract

More information

Speech Applications. How do they work?

Speech Applications. How do they work? Speech Applications How do they work? What is a VUI? What the user interacts with when using a speech application VUI Elements Prompts or System Messages Prerecorded or Synthesized Grammars Define the

More information

Mono-font Cursive Arabic Text Recognition Using Speech Recognition System

Mono-font Cursive Arabic Text Recognition Using Speech Recognition System Mono-font Cursive Arabic Text Recognition Using Speech Recognition System M.S. Khorsheed Computer & Electronics Research Institute, King AbdulAziz City for Science and Technology (KACST) PO Box 6086, Riyadh

More information

In Silico Vox: Towards Speech Recognition in Silicon

In Silico Vox: Towards Speech Recognition in Silicon In Silico Vox: Towards Speech Recognition in Silicon Edward C Lin, Kai Yu, Rob A Rutenbar, Tsuhan Chen Electrical & Computer Engineering {eclin, kaiy, rutenbar, tsuhan}@ececmuedu RA Rutenbar 006 Speech

More information

Part I. Hierarchical clustering. Hierarchical Clustering. Hierarchical clustering. Produces a set of nested clusters organized as a

Part I. Hierarchical clustering. Hierarchical Clustering. Hierarchical clustering. Produces a set of nested clusters organized as a Week 9 Based in part on slides from textbook, slides of Susan Holmes Part I December 2, 2012 Hierarchical Clustering 1 / 1 Produces a set of nested clusters organized as a Hierarchical hierarchical clustering

More information

Multi-Modal Human Verification Using Face and Speech

Multi-Modal Human Verification Using Face and Speech 22 Multi-Modal Human Verification Using Face and Speech Changhan Park 1 and Joonki Paik 2 1 Advanced Technology R&D Center, Samsung Thales Co., Ltd., 2 Graduate School of Advanced Imaging Science, Multimedia,

More information

MPEG-4 Version 2 Audio Workshop: HILN - Parametric Audio Coding

MPEG-4 Version 2 Audio Workshop: HILN - Parametric Audio Coding MPEG-4 Version 2 Audio Workshop: HILN - Parametric Audio Coding Heiko Purnhagen Laboratorium für Informationstechnologie University of Hannover, Germany Outline Introduction What is "Parametric Audio Coding"?

More information

Make text readable and understandable Make content appear and operate in predictable ways Help users avoid and correct mistakes

Make text readable and understandable Make content appear and operate in predictable ways Help users avoid and correct mistakes Table of Contents WCAG Overview Relation to Accessibility Laws Guidelines 1.2 Time-based Media Conforming to Success Criteria How to Meet 1.2.2 and 1.2.4 Captioning Requirements Quality Requirements for

More information

Optimization of Observation Membership Function By Particle Swarm Method for Enhancing Performances of Speaker Identification

Optimization of Observation Membership Function By Particle Swarm Method for Enhancing Performances of Speaker Identification Proceedings of the 6th WSEAS International Conference on SIGNAL PROCESSING, Dallas, Texas, USA, March 22-24, 2007 52 Optimization of Observation Membership Function By Particle Swarm Method for Enhancing

More information

Vulnerability of Voice Verification System with STC anti-spoofing detector to different methods of spoofing attacks

Vulnerability of Voice Verification System with STC anti-spoofing detector to different methods of spoofing attacks Vulnerability of Voice Verification System with STC anti-spoofing detector to different methods of spoofing attacks Vadim Shchemelinin 1,2, Alexandr Kozlov 2, Galina Lavrentyeva 2, Sergey Novoselov 1,2

More information

Handwritten Text Recognition

Handwritten Text Recognition Handwritten Text Recognition M.J. Castro-Bleda, Joan Pasto Universidad Politécnica de Valencia Spain Zaragoza, March 2012 Text recognition () TRABHCI Zaragoza, March 2012 1 / 1 The problem: Handwriting

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

Detection of Acoustic Events in Meeting-Room Environment

Detection of Acoustic Events in Meeting-Room Environment 11/Dec/2008 Detection of Acoustic Events in Meeting-Room Environment Presented by Andriy Temko Department of Electrical and Electronic Engineering Page 2 of 34 Content Introduction State of the Art Acoustic

More information

An Introduction to Pattern Recognition

An Introduction to Pattern Recognition An Introduction to Pattern Recognition Speaker : Wei lun Chao Advisor : Prof. Jian-jiun Ding DISP Lab Graduate Institute of Communication Engineering 1 Abstract Not a new research field Wide range included

More information

Transductive Phoneme Classification Using Local Scaling And Confidence

Transductive Phoneme Classification Using Local Scaling And Confidence 202 IEEE 27-th Convention of Electrical and Electronics Engineers in Israel Transductive Phoneme Classification Using Local Scaling And Confidence Matan Orbach Dept. of Electrical Engineering Technion

More information

Handwritten Text Recognition

Handwritten Text Recognition Handwritten Text Recognition M.J. Castro-Bleda, S. España-Boquera, F. Zamora-Martínez Universidad Politécnica de Valencia Spain Avignon, 9 December 2010 Text recognition () Avignon Avignon, 9 December

More information

Multi-task Multi-modal Models for Collective Anomaly Detection

Multi-task Multi-modal Models for Collective Anomaly Detection Multi-task Multi-modal Models for Collective Anomaly Detection Tsuyoshi Ide ( Ide-san ), Dzung T. Phan, J. Kalagnanam PhD, Senior Technical Staff Member IBM Thomas J. Watson Research Center This slides

More information

Evaluation of Moving Object Tracking Techniques for Video Surveillance Applications

Evaluation of Moving Object Tracking Techniques for Video Surveillance Applications International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Evaluation

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

Noisy Text Clustering

Noisy Text Clustering R E S E A R C H R E P O R T Noisy Text Clustering David Grangier 1 Alessandro Vinciarelli 2 IDIAP RR 04-31 I D I A P December 2004 1 IDIAP, CP 592, 1920 Martigny, Switzerland, grangier@idiap.ch 2 IDIAP,

More information

A ROBUST SPEAKER CLUSTERING ALGORITHM

A ROBUST SPEAKER CLUSTERING ALGORITHM A ROBUST SPEAKER CLUSTERING ALGORITHM J. Ajmera IDIAP P.O. Box 592 CH-1920 Martigny, Switzerland jitendra@idiap.ch C. Wooters ICSI 1947 Center St., Suite 600 Berkeley, CA 94704, USA wooters@icsi.berkeley.edu

More information

IPC. Communication. Layered Protocols. Layered Protocols (1) Data Link Layer. Layered Protocols (2)

IPC. Communication. Layered Protocols. Layered Protocols (1) Data Link Layer. Layered Protocols (2) IPC Communication Chapter 2 Inter-Process Communication is the heart of all DSs. Processes on different machines. Always based on low-level message passing. In this chapter: RPC RMI MOM (Message Oriented

More information

MPEG-7 Audio: Tools for Semantic Audio Description and Processing

MPEG-7 Audio: Tools for Semantic Audio Description and Processing MPEG-7 Audio: Tools for Semantic Audio Description and Processing Jürgen Herre for Integrated Circuits (FhG-IIS) Erlangen, Germany Jürgen Herre, hrr@iis.fhg.de Page 1 Overview Why semantic description

More information

Rebuilding Speech Recognition on Windows

Rebuilding Speech Recognition on Windows Rebuilding Speech Recognition on Windows Haiyan Wang IDIAP-Com 01-09 JANUARY 2001 Dalle Molle Institute for Perceptual Artificial Intelligence P.O.Box 592 Martigny Valais Switzerland phone +41 27 721 77

More information

Automatic Speech Recognition using Dynamic Bayesian Networks

Automatic Speech Recognition using Dynamic Bayesian Networks Automatic Speech Recognition using Dynamic Bayesian Networks Rob van de Lisdonk Faculty Electrical Engineering, Mathematics and Computer Science Delft University of Technology June 2009 Graduation Committee:

More information

TALK project work at UCAM

TALK project work at UCAM TALK project work at UCAM Matt Stuttle August 2005 Web: Email: http://mi.eng.cam.ac.uk/ mns25 mns25@eng.cam.ac.uk Dialogs on Dialogs Overview TALK project Goals Baseline system the Hidden Information State

More information

Speaker Verification in BeVocal VoiceXML

Speaker Verification in BeVocal VoiceXML Speaker Verification in BeVocal VoiceXML Version 1.5 May 2001 BeVocal, Inc. 1380 Bordeaux Drive Sunnyvale, CA 94089 2001. BeVocal, Inc. All rights reserved. 2 SPEAKER VERIFICATION IN BEVOCAL VOICEXML Table

More information

An Adaptive Approach to Collecting Multimodal Input

An Adaptive Approach to Collecting Multimodal Input An Adaptive Approach to Collecting Multimodal Input Anurag Gupta University of New South Wales School of Computer Science and Engineering Sydney, NSW 2052 Australia akgu380@cse.unsw.edu.au Abstract Multimodal

More information

A Comparison of Sequence-Trained Deep Neural Networks and Recurrent Neural Networks Optical Modeling For Handwriting Recognition

A Comparison of Sequence-Trained Deep Neural Networks and Recurrent Neural Networks Optical Modeling For Handwriting Recognition A Comparison of Sequence-Trained Deep Neural Networks and Recurrent Neural Networks Optical Modeling For Handwriting Recognition Théodore Bluche, Hermann Ney, Christopher Kermorvant SLSP 14, Grenoble October

More information

Quality of Service and Quality of T-Labs Berlin

Quality of Service and Quality of T-Labs Berlin Quality of Service and Quality of Experience @ T-Labs Berlin Sebastian Möller, Alexander Raake and Marcel Wältermann Quality and Usability Lab Deutsche Telekom Laboratories TU Berlin {sebastian.moeller,

More information

LATENT SEMANTIC INDEXING BY SELF-ORGANIZING MAP. Mikko Kurimo and Chafic Mokbel

LATENT SEMANTIC INDEXING BY SELF-ORGANIZING MAP. Mikko Kurimo and Chafic Mokbel LATENT SEMANTIC INDEXING BY SELF-ORGANIZING MAP Mikko Kurimo and Chafic Mokbel IDIAP CP-592, Rue du Simplon 4, CH-1920 Martigny, Switzerland Email: Mikko.Kurimo@idiap.ch ABSTRACT An important problem for

More information

Geometric-Edge Random Graph Model for Image Representation

Geometric-Edge Random Graph Model for Image Representation Geometric-Edge Random Graph Model for Image Representation Bo JIANG, Jin TANG, Bin LUO CVPR Group, Anhui University /1/11, Beijing Acknowledgements This research is supported by the National Natural Science

More information

AN ITERATIVE APPROACH TO DECISION TREE TRAINING FOR CONTEXT DEPENDENT SPEECH SYNTHESIS. Xiayu Chen, Yang Zhang, Mark Hasegawa-Johnson

AN ITERATIVE APPROACH TO DECISION TREE TRAINING FOR CONTEXT DEPENDENT SPEECH SYNTHESIS. Xiayu Chen, Yang Zhang, Mark Hasegawa-Johnson AN ITERATIVE APPROACH TO DECISION TREE TRAINING FOR CONTEXT DEPENDENT SPEECH SYNTHESIS Xiayu Chen, Yang Zhang, Mark Hasegawa-Johnson Department of Electrical and Computer Engineering, University of Illinois

More information

Particle Filtering. CS6240 Multimedia Analysis. Leow Wee Kheng. Department of Computer Science School of Computing National University of Singapore

Particle Filtering. CS6240 Multimedia Analysis. Leow Wee Kheng. Department of Computer Science School of Computing National University of Singapore Particle Filtering CS6240 Multimedia Analysis Leow Wee Kheng Department of Computer Science School of Computing National University of Singapore (CS6240) Particle Filtering 1 / 28 Introduction Introduction

More information

Bo#leneck Features from SNR- Adap9ve Denoising Deep Classifier for Speaker Iden9fica9on

Bo#leneck Features from SNR- Adap9ve Denoising Deep Classifier for Speaker Iden9fica9on Bo#leneck Features from SNR- Adap9ve Denoising Deep Classifier for Speaker Iden9fica9on TAN Zhili & MAK Man-Wai APSIPA 2015 Department of Electronic and Informa2on Engineering The Hong Kong Polytechnic

More information