This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2009 WRI World Congress on Computer Science and Information Engineering
Design of Fusion Classifiers for Voice-Based Access Control System of Building Security
Los Angeles, California USA
March 31-April 02
ISBN: 978-0-7695-3507-4
Secure buildings are currently protected from unauthorized access by a variety of devices. Nowadays, there are many kinds of devices to guarantee the building security such as PIN pads, keys both conventional and electronic, identity cards, cryptographic and dual control procedures. In this paper, voice-based biometric system is introduced for access control. The ability to verify the identity of a person by analyzing his/her speech, or speaker verification, is an attractive and relatively unobtrusive means of providing security for admission into an important or secured place. An individual’s voice cannot be stolen, lost, forgotten, guessed, or impersonated with accuracy. In the field of speaker verification, the main objective is to achieve the highest possible classification accuracy. The proposed system focused on combining the classification scores. In score fusion, each feature set is modeled separately, and the output score of the classifiers are combined to give the overall match score. Furthermore, for each classifier score, an a priori weight is set based on the level of confidence of the feature set and the classifier. The classifiers involved in this work are Gaussian Mixture Models (GMMs), Multilayer Feedforward Network (MFN) and Support Vector Machines (SVMs). Experimental result confirms that in terms of false acceptance rate (FAR) and false rejection rate (FRR), the Fusion Classifiers is effective to use in the proposed system.
Index Terms:
acess control, speaker verification, fusion classifiers, combine score
Citation:
Syazilawati Mohamed, Wahyudi Martono, "Design of Fusion Classifiers for Voice-Based Access Control System of Building Security," csie, vol. 6, pp.80-84, 2009 WRI World Congress on Computer Science and Information Engineering, 2009
Usage of this product signifies your acceptance of the Terms of Use.