Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aladdin M. Ariyaeeinia is active.

Publication


Featured researches published by Aladdin M. Ariyaeeinia.


IEEE Transactions on Audio, Speech, and Language Processing | 2007

Efficient Speaker Change Detection Using Adapted Gaussian Mixture Models

Amit S. Malegaonkar; Aladdin M. Ariyaeeinia; P. Sivakumaran

A new approach to speaker change detection is proposed and investigated. The method, which is based on a probabilistic framework, provides an effective means for tackling the problem posed by phonetic variation in high-resolution speaker change detection. Additionally, the approach incorporates the capability for dealing with undesired effects of variations in speech characteristics. Using the experimental investigations conduced with clean and broadcast news audio, it is shown that the proposed method is significantly more effective than the currently popular techniques for speaker change detection. To enhance the computational efficiency of the proposed method, modified implementation algorithms are introduced which are based on the exploitation of the redundant operations and a fast scoring procedure. It is shown that, through the use of the proposed fast algorithm, the computational efficiency of the approach can be increased by over 77% without significant reduction in its accuracy. The paper discusses the principles and characteristics of the proposed speaker change detection method, and provides a detailed description of its efficient implementation. The experiments, investigating the performance of the proposed method and its effectiveness in relation to other approaches, are described and an analysis of the results is presented.


Science & Justice | 2008

A test of the effectiveness of speaker verification for differentiating between identical twins

Aladdin M. Ariyaeeinia; Christopher Morrison; Amit S. Malegaonkar; Sue Black

This paper presents investigations into the ability of speaker verification technology to discriminate between identical twins. It is shown that whilst, in general, the genetic and non-genetic characteristics of voice are both of value to speaker verification capabilities, it is the latter which is highly beneficial in the separation of the speech of identical twins. It is further demonstrated that through the use of unconstrained cohort normalisation as a complementary means for the exploitation of such voice characteristics, the verification reliability can be considerably enhanced for both identical twins and unrelated speakers. Experiments were conducted using a bespoke clean-speech database consisting of utterances from 49 identical twin pairs. The paper details the problem in speaker verification posed by identical twins, discusses the experimental investigations and provides an analysis of the results.


IEEE Signal Processing Letters | 2006

Unsupervised speaker change detection using probabilistic pattern matching

Amit S. Malegaonkar; Aladdin M. Ariyaeeinia; P. Sivakumaran; J. Fortuna

This letter presents an investigation into the use of a probabilistic pattern matching approach for detecting speaker changes in audio streams. The experiments are conducted using clean speech as well as broadcast news material. It is shown that, in the proposed approach, the use of bilateral scoring is considerably more effective than unilateral scoring. Appropriate score normalization methods are considered in the study. It is observed that in all the cases, the bilateral scoring approach outperforms the currently popular method of Bayesian information criterion (BIC) for speaker change detection. This letter discusses the principles of the proposed approach and details the experimental investigations


Pattern Recognition Letters | 2009

Qualitative fusion of normalised scores in multimodal biometrics

Fawaz Alsaade; Aladdin M. Ariyaeeinia; Amit S. Malegaonkar; Surosh G. Pillay

A new approach to enhancing the accuracy of multimodal biometrics is investigated. The proposed approach, which involves combining score normalisation and qualitative-based fusion, is shown to considerably improve the accuracy of multimodal biometrics under different data conditions.


Signal Processing-image Communication | 2016

De-identification for privacy protection in multimedia content

Slobodan Ribaric; Aladdin M. Ariyaeeinia; Nikola Pavesic

Privacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio-video surveillance. Each of these can potentially provide the means for privacy intrusion. De-identification is one of the main approaches to privacy protection in multimedia contents (text, still images, audio and video sequences and their combinations). It is a process for concealing or removing personal identifiers, or replacing them by surrogate personal identifiers in personal information in order to prevent the disclosure and use of data for purposes unrelated to the purpose for which the information was originally obtained. Based on the proposed taxonomy inspired by the Safe Harbour approach, the personal identifiers, i.e., the personal identifiable information, are classified as non-biometric, physiological and behavioural biometric, and soft biometric identifiers. In order to protect the privacy of an individual, all of the above identifiers will have to be de-identified in multimedia content. This paper presents a review of the concepts of privacy and the linkage among privacy, privacy protection, and the methods and technologies designed specifically for privacy protection in multimedia contents. The study provides an overview of de-identification approaches for non-biometric identifiers (text, hairstyle, dressing style, license plates), as well as for the physiological (face, fingerprint, iris, ear), behavioural (voice, gait, gesture) and soft-biometric (body silhouette, gender, age, race, tattoo) identifiers in multimedia documents. Privacy protection in multimedia.Taxonomy of the personal identifiers in multimedia contents.De-identification of non-biometrical identifiers.De-identification of physiological, behavioural and soft biometric identifiers.


Speech Communication | 2003

Sub-band based text-dependent speaker verification

P. Sivakumaran; Aladdin M. Ariyaeeinia; Martin J. Loomes

Original article can be found at: http://www.sciencedirect.com/science/journal/01676393 --Copyright Elsevier B.V.


international convention on information and communication technology electronics and microelectronics | 2014

Retaining expressions on de-identified faces

Lily Meng; Zongji Sun; Aladdin M. Ariyaeeinia; Ken L. Bennett

The extensive use of video surveillance along with advances in face recognition has ignited concerns about the privacy of the people identifiable in recorded documents. Prior research into face de-identification algorithms has successfully proposed k-anonymity methods that guarantee to thwart face recognition software. However, there has been little investigation into the preservation of the data utility such as gender and expression in the original images. To address this challenge, a new algorithm based on the Active Appearance Model is proposed here. The main attraction of the approach is that of the preservation of the data utility in terms of facial expression, whilst maintaining privacy protection. The former includes not only the preservation of the expression category (e.g. happy or sad), but also the details of the original expression (e.g. the intensity of a smile and movements of the lips). This is considered to be of significant value in real applications of face de-identification, where the given video contains facial images of the same expression with various degrees of intensity.


BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management | 2011

Performance evaluation in open-set speaker identification

Amit S. Malegaonkar; Aladdin M. Ariyaeeinia

The concern in this study is the approach to evaluating the performance of the open-set speaker identification process. In essence, such a process involves first identifying the speaker model in the database that best matches the given test utterance, and then determining if the test utterance has actually been produced by the speaker associated with the best-matched model. Whilst, conventionally, the performance of each of these two sub-processes is evaluated independently, it is argued that the use of a measure of performance for the complete process can provide a more useful basis for comparing the effectiveness of different systems. Based on this argument, an approach to assessing the performance of open-set speaker identification is considered in this paper, which is in principle similar to the method used for computing the diarisation error rate. The paper details the above approach for assessing the performance of open-set speaker identification and presents an analysis of its characteristics.


EURASIP Journal on Advances in Signal Processing | 2004

Voice biometrics over the internet in the framework of COST action 275

Laurent Besacier; Aladdin M. Ariyaeeinia; John S. D. Mason; Jean-François Bonastre; Pedro Mayorga; Corinne Fredouille; Sylvain Meignier; Johann Siau; Nicholas W. D. Evans; Roland Auckenthaler; Robert P. Stapert

The emerging field of biometric authentication over the Internet requires both robust person authentication and secure computer network protocols. This paper presents investigations of vocal biometric person authentication over the Internet, both at the protocol and authentication robustness levels. As part of this study, an appropriate client-server architecture for biometrics on the Internet is proposed and implemented. It is shown that the transmission of raw biometric data in this application is likely to result in unacceptably long delays in the process. On the other hand, by using data models (or features), the transmission time can be reduced to an acceptable level. The use of encryption/decryption for enhancing the data security in the proposed client-server link and its effects on the transmission time are also examined. Furthermore, the scope of the investigations includes an analysis of the effects of packet loss and speech coding on speaker verification performance. It is experimentally demonstrated that whilst the adverse effects of packet loss can be negligible, the encoding of speech, particularly at a low bit rate, can reduce the verification accuracy considerably. The paper details the experimental investigations conducted and presents an analysis of the results.


Signal Processing-image Communication | 1998

Analysis and design of stereoscopic television systems

Aladdin M. Ariyaeeinia

The performance of stereoscopic television systems and its dependence on various parameters are investigated. It is shown that the extent of the region of space which can be displayed in three dimensions without causing undue eye strain to the observer, and also the minimum detectable depth interval, are related to and may therefore be controlled by the systems geometrical and optical parameters. Distortion in three-dimensional images due to the difference between the depth magnification and the magnification of the xy-plane is also analysed. Finally, it is demonstrated that the expressions defining the relationship between the performance of a 3D television system and its various parameters form a useful basis for the design of a system of this type for a given application.

Collaboration


Dive into the Aladdin M. Ariyaeeinia's collaboration.

Top Co-Authors

Avatar

P. Sivakumaran

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

J. Fortuna

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar

Surosh G. Pillay

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar

Fawaz Alsaade

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar

Jill Hewitt

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar

Reza Sotudeh

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar

Li Meng

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar

Richard Polfreman

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar

Stratis Sofianos

University of Hertfordshire

View shared research outputs
Researchain Logo
Decentralizing Knowledge