566 research outputs found

    VOICE ACTIVITY DETECTION USING A SLIDING-WINDOW, MAXIMUM MARGIN CLUSTERING APPROACH

    Get PDF
    ABSTRACT Recently, an unsupervised, data clustering algorithm based on maximum margin, i.e. support vector machine (SVM) was reported. The maximum margin clustering (MMC) algorithm was later applied to the problem of voice activity detection, however, the application did not allow for real-time detection which is important in speech processing applications. In this paper, we propose a voice activity detector (VAD) based on a sliding window, MMC algorithm which allows for real-time detection. Our system requires a separate initialization stage which imposes an initial detection delay, however, once initialized the system can operate in real-time. Using TIMIT speech under several NOISEX-92 noise backgrounds at various SNRs, we show that our average speech and non-speech hit rates are better than state-of-the-art VADs

    Normalized, HOS-Based, Blind Speech Separation Algorithms

    Get PDF
    Abstrac

    Detection of voice conversion spoofing attacks using voiced speech

    Get PDF
    Speech consists of voiced and unvoiced segments that differ in their production process and exhibit different characteristics. In this paper, we investigate the spectral differences between bonafide and spoofed speech for voiced and unvoiced speech segments. We observe that the largest spectral differences lie in the 0–4 kHz band of voiced speech. Based on this observation, we propose a low-complexity, pre-processing stage which subsamples voiced frames prior to spoofing detection. The proposed pre-processing stage is applied to two systems, LFCC+GMM and IA/IF+KNN that differ entirely on the features and classifier used for spoofing detection. Our results show improvement with both systems in detection of the ASVspoof 2019 A17 voice conversion attack, which is recognized to have one of the highest spoofing capabilities. We also show improvements in the A18 and A19 voice conversion attacks for the IA/IF+KNN system. The resulting A17 EERs are lower than all reported systems where the A17 spoofing attack is the worst attack except the Capsule Network. Finally, we note that the proposed pre-processing stage reduces the speech date by more than 4× due to subsampling and using only voiced frames but at the same time maintaining similar pooled EER as that for the baseline systems, which may be advantageous for resource constrained spoofing detectors

    Quantitative assessment of paravalvular regurgitation following transcatheter aortic valve replacement

    Get PDF
    Paravalvular aortic regurgitation (PAR) following transcatheter aortic valve implantation (TAVI) is well acknowledged. Despite improvements, echocardiographic measurement of PAR largely remains qualitative. Cardiovascular magnetic resonance (CMR) directly quantifies AR with accuracy and reproducibility. We compared CMR and transthoracic echocardiography (TTE) analysis of pre-operative and post-operative aortic regurgitation in patients undergoing both TAVI and surgical aortic valve replacement (AVR).Gareth Crouch, Phillip J Tully, Jayme Bennetts, Ajay Sinhal, Craig Bradbrook, Amy L Penhall, Carmine G De Pasquale, Robert A Baker, and Joseph B Selvanayaga
    corecore