Acoustic comparison of electronics disguised voice using Different semitones

  • Authors

    • Mahesh K. Singh
    • A K. Singh
    • Narendra Singh
    2018-04-12
    https://doi.org/10.14419/ijet.v7i2.16.11502
  • Electronic disguised voice, Acoustic feature, Classifier, Speaker identification.
  • This paper emphasizes an algorithm that is based on acoustic analysis of electronics disguised voice. Proposed work is given a comparative analysis of all acoustic feature and its statistical coefficients. Acoustic features are computed by Mel-frequency cepstral coefficients (MFCC) method and compare with a normal voice and disguised voice by different semitones. All acoustic features passed through the feature based classifier and detected the identification rate of all type of electronically disguised voice. There are two types of support vector machine (SVM) and decision tree (DT) classifiers are used for speaker identification in terms of classification efficiency of electronically disguised voice by different semitones.

     

     

  • References

    1. [1]. A.F.Abdulwahab,S.A.Mohd and H.Husni, “Acoustic comparison of Malasian and Nigerian English accents,†Journal of telecommunication, electronics and computer engineering, vol. 9,No.3-5 pp.141-146,Nov.2017.

      [2]. Marco Grimaldi and Fred Cummins, “Speaker identiï¬cation using instantaneous frequencies,†IEEE transactions on audio, speech, and language processing, vol. 16, no. 6, pp.1097-1111, Aug. 2008.

      [3]. Hamed Riazati Seresht, Seyed Mohammad Ahadi and Sanaz Seyedin, “Spectro-temporal power spectrum features for noise robust ASR,†Circuits, Systems, and Signal Processing, vol. 36, Issue 8, pp. 3222–3242, Aug. 2017.

      [4]. C. Jingxu, Y. Hongchen, and S. Zhanjiang, “The speaker automatic identiï¬ed system and its forensic application,†in Proc. Int. Symp. Compute. Inf., vol. 1, pp. 96–100, 2004.

      [5]. X. Zhu, G. Beauregard, and L. Wyse, “Real-time signal estimation from modiï¬ed short-time Fourier transform magnitude spectra,†IEEE Trans. Audio, Speech Lang. Process., vol. 15, no. 5, pp. 1645–1653, Aug. 2007.

      [6]. R. Rodman, “Speaker recognition of disguised voices: A program for research,†in Proc. Consortium Speech Technol. Conjunct. Conf. Speaker Recognition. Man Mach, Direct. Forensic, pp. 9–22, Appl., 1998.

      [7]. R. Hsiao, M. C. Fuhs, Y.-C. Tam, Q. Jin, and T. Schultz, “The CMUinterACT 2008 Mandarin transcription system,†in INTERSPEECH, 2008, pp. 1445-1448.

      [8]. S. Amuda, H. Boril, A. Sangwan, and J. H. Hansen, “Limited resource speech recognition for Nigerian English,†in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2010, pp. 5090-5093.

      [9]. D. Vergyri, L. Lamel, and J.-L. Gauvain, “Automatic speech recognition of multiple accented English data,†in INTERSPEECH, 2010, pp. 1652-1655.

      [10]. R. Soorajkumar, G. Girish, P. B. Ramteke, S. S. Joshi, and S. G. Koolagudi, “Text-Independent Automatic Accent Identification System for Kannada Language,†in Proceedings of the International Conference on Data Engineering and Communication Technology, 2017, pp. 411-418.

      [11]. A. Rabiee and S. Setayeshi, “Persian accents identification using an adaptive neural network,†in Proceedings of the 2nd International Workshop on Education Technology and Computer Science, 2010, pp. 7-10.

      [12]. L. M. Arslan and J. H. L. Hansen, “Language accent classification in American English,†Speech Communication, vol. 18, pp. 353-367, 1996.

      [13]. A. Hanani, M. J. Russell, and M. J. Carey, “Human and computer recognition of regional accents and ethnic groups from British English speech,†Computer Speech & Language, vol. 27, pp. 59-74, 2013.

      [14]. Haojun Wu, Yong Wang and Jiwu Huang, “Identiï¬cation of electronic disguised voices,†IEEE transactions on information forensics and security, vol. 9, no. 3, pp.489-500, March 2014.

      [15]. Haojun Wu, Yong Wang and Jiwu Huang, “Blind detection of electronic disguised voice,†IEEE international conference on acoustics, speech and signal processing (ICASSP), pp.3016-3017 May.2013.

      [16]. Audacity: free audio editor and recorder [online]" in http://audacity.sourceforge.net.

      [17]. T. Tan, “The effect of voice disguise on automatic speaker recognition,†IEEE Int. CISP, vol. 8. pp. 3538–3541. Oct. 2010.

      [18]. Reza Entezari-Maleki, Arash Rezaei and Behrouz Minaei-Bidgoli, “Comparison of Classification Methods Based on the Type of Attributes and Sample Size,†Journal of Convergence Information Technology, Vol. 4, no.3, pp.09-17, Sept. 2009.

      [19]. Rajeev Ranjan and Rajesh K. Dubey, “Isolated word recognition using HMM for Maithili dialect,â€IEEE, International conference on signal processing and communication, pp. 32-328, Dec. 2016.

      [20]. Cuiling Zhang, Tiejun Tan, “Voice disguise and automatic speaker recognition,†.Elsevier: Science Direct. Forensic Science International, vol.175, issues2-3, pp. 118–122, March 2008.

  • Downloads

  • How to Cite

    K. Singh, M., K. Singh, A., & Singh, N. (2018). Acoustic comparison of electronics disguised voice using Different semitones. International Journal of Engineering & Technology, 7(2.16), 98-101. https://doi.org/10.14419/ijet.v7i2.16.11502