PLDA-based Speaker Verification in Multi-Enrollment Scenario using Expected Vector Approach

被引:0
|
作者
Soni, Meet [1 ]
Panda, Ashish [1 ]
机构
[1] Tata Consultancy Serv, Mumbai, Maharashtra, India
关键词
Speaker Verification; Multi-session scoring; Multi-enrollment scoring; Expected Vector; END;
D O I
10.1109/ISCSLP49672.2021.9362113
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multi-Enrollment scoring scenario, where multiple utterances are available for an enrollment speaker, is one of the less explored problems in the Probabilistic Linear Discriminant Analysis (PLDA) scoring literature. Since the closed-form PLDA scoring formula for multi-enrollment scenario is impractical, alternate heuristic approaches are widely used for such scenarios in both i-vector and x-vector based speaker verification systems. In this paper, we describe an Expected Vector approach to obtain a vector from multiple enrollment utterances. Expected Vector approach uses a trained PLDA model to compute the expected class center given a set of vectors for that particular PLDA model. By using such an approach, a more meaningful class center representation can be obtained. This vector can be used to score a trial using two-vector scoring formula for a given PLDA model. We compare the performance of the proposed approach with various heuristic approaches and show that it provides significant improvements in terms of Equal Error Rate (EER) and minimum Detection Cost Function (minDCF). We show our results on x-vector system trained on Voxceleb dataset with various implementations of PLDA and trials designed on Voxceleb and Librispeech dataset.
引用
下载
收藏
页数:5
相关论文
共 50 条
  • [21] i-Vector-Based Speaker Verification on Limited Data Using Fusion Techniques
    Kumari, T. R. Jayanthi
    Jayanna, H. S.
    JOURNAL OF INTELLIGENT SYSTEMS, 2020, 29 (01) : 565 - 582
  • [22] Using Fishervoice to enhance the performance of I-vector based Speaker Verification System
    Li, Na
    Zeng, Xiangyang
    Li, Zhifeng
    Qiao, Yu
    Jiang, Weiwu
    2014 4TH IEEE INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2014, : 578 - 581
  • [23] D-vector based speaker verification system using Raw Waveform CNN
    Jung, Jeeweon
    Heo, Heesoo
    Yang, Ilho
    Yoon, Sunghyun
    Shim, Hyejin
    Yu, Hajin
    PROCEEDINGS OF THE 2017 INTERNATIONAL SEMINAR ON ARTIFICIAL INTELLIGENCE, NETWORKING AND INFORMATION TECHNOLOGY (ANIT 2017), 2017, 150 : 126 - 131
  • [24] Scenario-based verification in presence of variability using a synchronous approach
    Jean-Vivien Millo
    Frédéric Mallet
    Anthony Coadou
    S. Ramesh
    Frontiers of Computer Science, 2013, 7 : 650 - 672
  • [25] Scenario-based verification in presence of variability using a synchronous approach
    JeanVivienMILLO
    FrdricMALLET
    AnthonyCOADOU
    SRAMESH
    Frontiers of Computer Science, 2013, 7 (05) : 650 - 672
  • [26] Scenario-based verification in presence of variability using a synchronous approach
    Millo, Jean-Vivien
    Mallet, Frederic
    Coadou, Anthony
    Ramesh, S.
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (05) : 650 - 672
  • [27] Robust speaker verification based on multi stage vector quantization of MFCC parameters on narrow bandwidth channels
    Homayounpour, M. Mehdi
    Rezaian, Iman
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 336 - 340
  • [28] MULTI-CLASS UBM-BASED MLLR M-VECTOR SYSTEM FOR SPEAKER VERIFICATION
    Sarkar, A. K.
    Barras, C.
    2013 PROCEEDINGS OF THE 21ST EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2013,
  • [29] Anchor and UBM-based Multi-Class MLLR M-Vector System for Speaker Verification
    Sarkar, A. K.
    Barras, C.
    14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5, 2013, : 2449 - 2453
  • [30] A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers
    Roy, Anindya
    Magimai-Doss, Mathew
    Marcel, Sebastien
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 241 - 254