KEYWORD RECOGNITION WITH PHONE CONFUSION NETWORKS AND PHONOLOGICAL FEATURES BASED KEYWORD THRESHOLD DETECTION Abhijeet Sangwan and John H. L. Hansen Center for Robust Speech Systems (CRSS), Department of Electrical Engineering, University of Texas at Dallas, Richardson, Texas, U.S.A ABSTRACT In this study, a new keyword spotting system (KWS) that utilizes phone confusion networks (PCNs) is presented. The new system exploits the compactness and accuracy of phone confusion networks to deliver fast and accurate results. Special design considerations are provided within the new algorithm to account for phone recognizer induced insertion and deletion errors. Furthermore, this study proposes a new threshold estimation technique that uses the keyword constituent phones and phonological features (PFs) for threshold computation. The new threshold estimation technique is able to deliver thresholds that improves the overall F-score for keyword detection. The final integrated system is able to achieve a better balance between precision and recall. Index Terms— Keyword Spotting, Phone Confusion Networks, Threshold Estimation, Phonological Features 1. INTRODUCTION Keyword spotting (KWS) systems provide the capability of detecting any word (or phrase) in an utterance stream. KWS is an extremely useful technology in a number of applications such as retrieval of audio documents (such as voicemails), command and control (such as cellphones), surveillance, agent monitoring in call-centers etc. KWS techniques can be broadly classified as LVCSRbased (large vocabulary continuous speech recognition) or phone-based [1, 2]. LVCSR techniques first perform speech recognition and then utilize either the transcripts or word lattices to search for keywords. While this technique tends to perform more accurately as compared to the phone-based approach, the speech recognition process limits the vocabulary of what can be searched [3]. Additionally, the LVCSR approach also requires more computational resources which can be prohibitive in certain applications. On the other hand, phone-based approaches model keywords as phonesequences and attempt to search for keyword in the phone This project was funded by AFRL through a subcontract to RADC Inc. under FA8750-09-C-0067, and partially by the University of Texas at Dallas from the Distinguished University Chair in Telecommunications Engineering held by J. H. L. Hansen.

space. Here, various techniques have been proposed that utilize 1-best decoded sequences as well as phone lattices. These techniques are generally HMM-based, but newer techniques based on SVM and discriminative training have also been proposed [1]. Phone-based KWS techniques generally suffer from high false-alarm rates which in turn are a consequence of large number of substitution, insertion, and deletion errors in the decoded phone sequences. In this study, we propose a new KWS system that uses phone confusion networks (PCNs) to search for keywords. Confusion Networks (CNs) are a special form of lattices that are more compact than standard ASR (automatic speech recognition) lattices. Additionally, CNs can often be more accurate than lattices in terms of WER (word error rates) [4]. These properties of CNs make them an attractive option for fast and accurate keyword searching. Furthermore, we also propose a keyword-specific threshold estimation technique which allows for better control of miss and false-alarm rates in the detection process. The new technique uses constituent phones and phonological features (PFs, [5]) of keywords for threshold estimation. 2. PROPOSED KWS SYSTEM The proposed KWS system is shown in Figure 1. The speech signal is first decoded using a standard monophone-based ASR (automatic speech recognition) system and the corresponding phone lattices are obtained. Next, the lattices are converted into phone confusion networks (PCNs). Subsequently, the proposed KWS algorithm is used to search for keywords and estimate the likelihood of their presence inside the PCNs. The keyword is spotted only if the estimated likelihood exceeds a threshold. Here, keyword-specific thresholds are estimated by the new threshold-estimation algorithm. We describe both algorithms in more details below. 2.1. Proposed PCN-based KWS algorithm The proposed KWS algorithm searches for keywords using the phone confusion networks (PCNs) . Therefore, we first briefly review the structure of confusion networks. A confusion network (CN) is a special kind of lattice in which every

Fig. 1. Proposed Keyword Spotting (KWS) system: Phone Confusion Networks (PCNs) are obtained for the speech signal by using an automatic speech recognition (ASR) engine. The proposed KWS algorithm is utilized to estimate the keyword likelihood for speech given the PCNs. A maximum entropy (ME) based threshold estimation technique that is based on Phonological Features (PF) is used to estimate the best threshold for a given keyword. hypothesized path passes through all the nodes. For example, Fig. 2 shows a phone confusion network (PCN) with 6 nodes, namely, from 0 to 5. In a PCN, each edge is associated with a phone and its posterior probability. Consequently, the posterior probabilities of all phones between two consecutive nodes sums up to unity. Each path from the starting node (0) to ending node (5) represents a hypothesized phone-sequence whose likelihood is computed by multiplying the posteriors corresponding to the path. For example, in Fig. 2, 4 edges join nodes 0 and 1. These edges are associated with phones /sh/, /y/, /ih/, and /*e*/ with corresponding posterior probabilities 0.2, 0.01, 0.7, and 0.29, respectively. Following the paths from node 0 to node 6, /sh/, /*e*/, /ao/, /r/, and /t/ represents one possible realized phone-sequence from the PCN with total probability 0.0588. In PCNs, /*e*/ represents a special phone whose posterior-probability can be interpreted as the probability that no phones are realized during this transition. In other words, the special phone /*e*/ allows phonesequences of different lengths to be realized from the PCN. Finally, the edges in the PCN also contain other decoding information such as the phone time alignments, namely, starting and ending times as hypothesized by the ASR decoder. Let K be the keyword of interest. Here, K is modeled as a phone-sequence, i.e., {q1 , q2 , ..., qm , ..., qn }, qi ∈ Q, where Q is the entire phone-set. Now, the likelihood of the keyword being present can be estimated by computing the likelihood of the phone-sequence being realized by the PCN. In practice, phone-decoding accuracy of ASR is impacted by a variety of artifacts such as noise, channel, accents etc. leading to a number of substitution, insertion, and deletion errors in the output. Therefore, a simple strategy such as searching for the phone-sequence corresponding to the keyword in the PCN realizations is expected to be error prone. While substitution errors are easily handled within the PCN structure (by choosing

the desirable phone-sequence realization among alternatives), additional consideration is required to manage ASR induced insertion and deletion errors. In order to mitigate the impact of insertion errors, we exploit the probability of /*e*/ in our algorithmic design. First, we allow random insertion of /*e*/ in our keyword phonesequence to expand the number of possible keyword realizations. For example, the phone-sequence /sh/ /ao/ /r/ /t/ corresponds to the canonical realization of the keyword “short”. As shown in Fig. 2, this canonical phone sequence is not realized by the PCN. However, by allowing an insertion of the special phone /*e*/ in the phone sequence, (i.e., /sh/ /*e*/ /ao/ /r/ /t/), the keyword “short” can be realized by the PCN. Here, we would like to be able to insert /*e*/ in the phone sequence with maximum flexibility to cover all possible variability in the keyword realization. For example, /sh/ /*e*/ /*e*/ /ao/ /*e*/ /r/ /t/ and /sh/ /ao/ /r/ /*e*/ /*e*/ /*e*/ /t/ represent two other possible realizations of the keyword among many more. One convenient method of representing all possible realizations is to treat the canonical phones as Markov-states, and the keyword as a Markov model. Furthermore, in this Markov model the occurrence of a canonical phone triggers a transition into the state corresponding to that phone, and the occurrence of /*e*/ is treated as self-transition. For example, the trellis for “short” is shown in Fig. 2. Whenever the phone /sh/ is encountered in the PCN, a transition occurs in the trellis and the state /sh/ is occupied. Now, a transition is made to /ao/ if /ao/ is encountered in the PCN. Alternatively, if /*e*/ is encountered in the PCN, a self-transition is made into /sh/. If neither the next canonical phone /ao/ nor the special phone /*e*/ occurs, then the trellis resets and decoding begins from the starting state (S) again. On the other hand, occupation of the ending state (E) corresponds to the detection of a realization of the keyword phone-sequence. In this manner, the

Fig. 2. Proposed PCN-based KWS algorithm: The keyword HMM topology allows transitions into succeeding phone-states, self-transitions to handle ASR induced insertion errors, and 1-state skipping to handle ASR induced deletion errors. The Keyword HMM is traversed based on phone and posterior probability observations in the PCN. proposed keyword Markov model is capable of detecting the keyword while handling ASR induced insertion errors. Allowing multiple insertions of /*e*/ could lead to erroneous detection of keywords if the preceding and succeeding canonical phones occur far apart in time. In order to avoid this type of false-detection, transitions are only allowed between canonical phones if the difference between ending and starting time of the preceding and succeeding phones is below an upper-bound T as shown in Fig. 2. In our experiments, we set T = 50ms. While the proposed trellis structure handles ASR induced insertion errors, an additional modification is required to manage ASR induced deletion errors. As shown in Fig. 2, a special transition which allows one state to be skipped is allowed. The likelihood of the keyword occurring is computed by using the Viterbi algorithm. This corresponds to the likelihood of the most likely keyword realization. We describe the computation below. The transitions in the proposed keyword trellis occur as we parse each PCN node left-to-right. In other words, a jump from between successive nodes in the PCN updates the state likelihoods within the trellis. We describe the computation for one step. The likelihood of being in the mth canonical phone-state of the Keyword K while traversing between nodes ni to ni+1 in the PCN (Λ(qm , ni , ni+1 ) is given by:   pqm ,ni ,ni+1 ∗ Λ(qm−1 ) pd ∗ Λ(qm−2 ) Λ(qm , ni , ni+1 ) = max  p/∗e∗/,ni ,ni+1 ∗ Λ(qm ) where pqm ,ni ,ni+1 is the posterior probability of phone qm

while traversing from ni to ni+1 in the PCN. Similarly, p/∗e∗/,ni ,ni+1 is the posterior probability of /*e*/ while traversing from ni to ni+1 in the PCN. pd is the deletion probability which is set to 0.001 in all our experiments. Using the above equation, the state likelihood for the ending state (E) is computed. The likelihoods are updated with every jump between successive nodes in the PCN. In this manner, a new keyword likelihood is generated for every node in the PCN. It is noted that majority of the keyword likelihood values are 0, and only non-zero values are chosen for further processing. 2.2. Proposed Threshold Estimation Technique Phone based keyword detectors are known to generate a large number of false-alarms. Therefore, proper thresholding is important to maintain the trade-off between recall and precision. Analysis of the likelihood score distribution of different keywords reveals that the ideal threshold for each keyword is different. Therefore, using one value of threshold for all keywords results in poor overall performance. In order to mitigate the difference in keyword likelihood distribution, we apply mean-normalization to the likelihood scores. The normalization is performed separately for each keyword. While this step improves the performance slightly, the best threshold for each keyword still remains different. We propose a threshold estimation technique that can automatically determine the best threshold for a given keyword. Our hypothesis is that the phones as well as phonological features (PFs) constituting the keyword have an impact on the

threshold value. Therefore, we propose to learn the functional relationship between phones and PFs on one hand, and the threshold on the other by utilizing ME (maximum entropy) technique. As before, let {q1 , q2 , ..., qm , ..., qn } represent the phones in the keyword K. Additionally, let {a1 , a2 , ..., al } represent the phonological features that constitute K. For example, “pressure” consists of phones /p/ /r/ /eh/ /sh/ /er/ and phonological features /labial/ /rhotic/ /mid:mid-front/ /postalveolar/ /rhotic/. Now, we use ME to learn the conditional probability relationship, f (τk |q1 , q2 , ..., qn , a1 , a2 , ..., al ),

(1)

where τk represents discrete values of the threshold. The conditional probability attempts to learn which phone and phonological features impact the threshold the most. Additionally, it also uses this knowledge to predict the best value of threshold given the keyword phones and phonological features. In order to obtain a good estimate of this conditional probability relationship, a large number of keywords is chosen during training. Finally, the ML (maximum likelihood) estimate of τk is chosen as the threshold to be applied for detection. 3. ANALYSIS AND RESULTS 3.1. Experimental Setup The proposed KWS system was evaluated on the TIMIT, SPINE and Switchboard (SWB) corpora. The evaluation material for each corpora was as follows: 71 hrs of SWB data with 25 keywords, 4 hrs of SPINE data with 32 Keywords, and standard TIMIT test corpora with 53 Keywords. All keywords were chosen to be a minimum of 4 phones long. Additionally, a separate list of 370 keywords for TIMIT, and 250 keywords for SPINE and SWB was chosen to train the proposed ME-based threshold estimator. This keyword set had no overlap with the keyword set used for evaluation. In order to perform phone decoding, standard HMMbased monophone models were trained separately for each test set using standard 39-dimensional MFCCs (Mel frequency cepstral coefficients). The HMM topology of the monophones consisted of 3-states with 128 mixtures for SWB, and 32-mixtures for SPINE and TIMIT corpora. Additionally, the monophone recognizer for SWB, SPINE and TIMIT was trained on 350 hours, 12 hours, and the standard train set, respectively. There was no overlap between train and test sets for all 3 corpora. The entire system was trained using the CMU sphinx recognizer. The recognizer was used to generate phone lattices for every test utterance. Additionally, SRILM toolkit was employed to convert the lattices into phone confusion networks (PCNs). 3.2. Baseline System The proposed KWS system was compared to a garbage modeling based KWS spotting technique which uses a likelihood

Table 1. Proposed and Baseline KWS Systems Performance Corpus System F-score Recall Precision TIMIT Baseline 0.29 0.87 0.22 PCN 0.54 0.59 0.49 PCN-Threhold 0.56 0.59 0.54 PCN-Oracle 0.62 0.59 0.67 SPINE Baseline 0.29 0.87 0.22 PCN 0.53 0.51 0.57 PCN-Threhold 0.55 0.51 0.6 PCN-Oracle 0.57 0.53 0.6 SWB Baseline 0.19 0.68 0.12 PCN 0.36 0.31 0.43 PCN-Threhold 0.37 0.33 0.43 PCN-Oracle 0.39 0.35 0.43

ratio strategy [1, 6]. This model consists of two parts, namely, the keyword model and the garbage model. The keyword is modeled by the phone sequence of the keyword along with a right and left context models. Here, the context models allow any possible phone sequence. Therefore, the decoding allows for any phone sequence to occur to the left or right of the keyword. On the other hand, the garbage model is modeled only by the context model, (i.e., it allows any phone sequences to occur in decoding). The likelihoods of the keyword and garbage models can be used to set up a likelihood ratio test (LRT) where comparison to a threshold determines if the keyword is present or absent. The above described baseline system was constructed using the monophone recognizers described in Sec. 3.1. Thereafter, the baseline system was tested on the test sets described in Sec. 3.1, and the evaluation results are shown in Table 3.1. It is noted that in our evaluations, we use the standard definition of F-score, recall, and precision. It can be observed that the baseline system delivers high recall (0.87, 0.87, and 0.68 for TIMIT, SPINE and SWB, respectively), it suffers from poor precision (0.22, 0.22, and 0.12, for TIMIT, SPINE, and SWB respectively). 3.3. Proposed PCN-based KWS Table 3.1 shows the performance of the proposed PCN-based KWS system. The F-scores of the PCN-based KWS system for TIMIT, SPINE, and SWB are 0.54, 0.53, and 0.36, respectively, which is an absolute F-score improvement of 0.25, 0.24, and 0.17 over the baseline systems, respectively. Additionally, it is seen that the proposed system achieves a better balance between precision and recall as compared to the baseline system. The impact of keyword prior probability on the performance of the proposed KWS algorithm is shown in Fig. 3. Here, prior probability is defined as the ratio of number of utterances containing the keyword over total number of test

Table 2. Threshold Estimation Accuracy when using phone features only, PF features only, and combined feature-set Corpus Phones PFs Phones+PFs TIMIT 39% 37.7% 45.3% SPINE 34% 37.5% 41% SWB 36% 32% 38% 4. CONCLUSION

Fig. 3. Relationship between Keyword’s prior probability of occurrence vs. detection accuracy. utterances. For example, a prior of 0.1 would indicate that 10% of all utterances contain the desired keywords. From Fig. 3, it can be seen that the KWS performance is more sensitive to prior probability values below 0.1 (i.e., performance improves as the density of keywords increases).

In this study, a new KWS (Keyword Spotting) algorithm was proposed that exploits the PCN (Phone Confusion Network) structure for fast and accurate keyword search. The design of the new algorithm offers robustness to phone recognition induced substitution, deletion, and insertion errors. Experimental evaluation reveals that the proposed algorithm outperforms traditional keyword/garbage model based KWS technique on 3 different corpora: TIMIT (read speech), SPINE (noisy spontaneous speech) and Switchboard (spontaneous conversational speech). The new algorithm achieves higher F-scores, and a better balance between precision and recall. Furthermore, a new threshold estimation technique has also been proposed in this study. The new technique uses the constituent phones and PFs (phonological features) of keywords as input features to determine keyword-specific thresholds. Using this new technique, a further improvement in KWS Fscores has been obtained.

3.4. Proposed Thresholding Technique In order to train the ME-model for threshold prediction, the PCN-based KWS system was run on the training keyword sets described in Sec. 3.1. Thereafter, the best oracle threshold for each keyword was determined. The best values of threshold were found to lie between 2 and 5 for all keywords. Additionally, the thresholds were discretized with a step size of 0.5. The constituent phone sequence and phonological features were determined for each keyword. Subsequently, the ME-based threshold estimator was trained separately for each corpora. In order to test the relative effectiveness of phones and PFs to predict the threshold, 3 separate models were trained. One model consisted of phones only as the input feature set, another used PFs only, while a third model used a combination of PFs and phones. Table 3.4 shows the accuracy of threshold prediction of these 3 models on all 3 corpora. It is seen that a combination of phone and PF features result in best threshold prediction. As shown in Table 3.1 (PCN-Threshold), better KWS results are obtained using this new thresholding prediction technique. For comparison, the best possible results (PCNOracle) that could be obtained by always predicting the correct value of threshold are also shown. It can be seen that the proposed thresholding technique leads to performance improvement in all 3 corpora. However, the oracle numbers show that more improvement is still possible if the threshold estimation technique is further improved.

5. REFERENCES [1] J. Keshet, D. Grangier and S. Bengio, “Discriminative Keyword Spotting,”, Speech Communication , Vol. 51, No. 4, pp. 317-329, 2009. [2] I. Szoke, P. Schwarz, P. Matejka, L. Burget, M. Karafiat, M. Fapso, J. Cernocky,“Comparison of Keyword Spotting Approaches for Informal Continuous Speech,” Ninth European Conference on Speech Communication and Technology, 2005.l [3] K. Thambiratnam and S. Sridharan,“Dynamic match phone-lattice searches for very fast and accurate unrestricted vocabulary keyword spotting,” ICASSP 2005. [4] L. Mangu, E. Brill and A. Stolcke,“Finding consensus in speech recognition: word error minimization and other applications of confusion networks,” Computer Speech and Language, [5] A. Sangwan and J. Hansen, “Leveraging speech production knowledge for improved speech recognition,” Automatic Speech Recognition and Understanding (ASRU) 2009. [6] R. Rose and D. Paul, “A hidden Markov model based keyword recognition system,” ICASSP 1990.

KEYWORD RECOGNITION WITH PHONE ...

lance, agent monitoring in call-centers etc. KWS techniques can be broadly classified as LVCSR- based (large vocabulary continuous speech recognition) or.

291KB Sizes 1 Downloads 236 Views

Recommend Documents

Keyword Spotting Research
this problem is stated as a convex optimization problem with constraints. ...... Joachims T 2002 Optimizing search engines using clickthrough data Proceedings ...

Gadget_Technology KWs WWW.GADGETREVIEW.COM - Keyword ...
Gadget_Technology KWs WWW.GADGETREVIEW.COM - Keyword Links.pdf. Gadget_Technology KWs WWW.GADGETREVIEW.COM - Keyword Links.pdf.

To Go with phone #.pdf
tomatoes, cucumbers, onions. & guacamole. $5.95. Whoops! There was a problem loading this page. To Go with phone #.pdf. To Go with phone #.pdf. Open.

ROBUST CENTROID RECOGNITION WITH APPLICATION TO ...
ROBUST CENTROID RECOGNITION WITH APPLICATION TO VISUAL SERVOING OF. ROBOT ... software on their web site allowing the examination.

Markovian Mixture Face Recognition with ... - Semantic Scholar
cided probabilistically according to the probability distri- bution coming from the ...... Ranking prior like- lihood distributions for bayesian shape localization frame-.

To Go with phone #.pdf
There was a problem loading this page. Retrying... Whoops! There was a problem loading this page. Retrying... To Go with phone #.pdf. To Go with phone #.pdf.

Speech Recognition with Segmental Conditional Random Fields
learned weights with error back-propagation. To explore the utility .... [6] A. Mohamed, G. Dahl, and G.E. Hinton, “Deep belief networks for phone recognition,” in ...

ROBUST CENTROID RECOGNITION WITH ...
... and the desired and actual position vectors in the image plane, 6 the vector of joint ... Computer Graphics and Image Processing. Vol.16,. 1981. pp. 210-239.

Keyword Supremacy Review.pdf
Page 2 of 2. Name URL Info Short URL. Keyword. Supremacy. https://docs.google.com/spreadsheets/d/103xuTD0MBfAqTm. CWUAyuzjoQh5MVIML-wh7m8fcknUE/edit?usp=sharing. An overview. of our. Keyword. Supremacy. materials. https://goo.gl. /VlVz41. Keyword. Su

Prediction of Hard Keyword Queries
Keyword queries provide easy access to data over databases, but often suffer from low ranking quality. Using the benchmarks, to identify the queries that are like ...

Lesson 1.4: The art of keyword choice
Think about what you're trying to find. ○ Choose words that you think will appear on the page. ○ Put yourself in the mindset of the author of those words. Page 2. Hints to choose keywords … Question: “I heard there was some old city in San Fr

Discriminative Keyword Spotting - Research at Google
Oct 6, 2008 - Email addresses: [email protected] (Joseph Keshet), ...... alignment and with automatic forced-alignment. The AUC of the discriminative.

Keyword and Tag Planner LISTING.pdf
There was a problem loading more pages. Retrying... Keyword and Tag Planner LISTING.pdf. Keyword and Tag Planner LISTING.pdf. Open. Extract. Open with.

how to search by keyword
To create a new Playlist, drag and drop the desired learning object into the New Playlist box in the right-hand column. STEP TWO. eMediaVA will prompt you to ...

eBook Download SEO Keyword Strategy
Aug 21, 2012 - Book Synopsis. Keyword strategy helps you select the keywords for your. Search Engine Optimization campaign that will most contribute to ...

Cheap Diy Augmented Reality Ar Gun With Cell Phone Stand ...
Cheap Diy Augmented Reality Ar Gun With Cell Phone ... ames For Phone Free Shipping & Wholesale Price.pdf. Cheap Diy Augmented Reality Ar Gun With ...

The Development of a Cellular Phone Antenna with ...
new antenna types for portable cellular phones [5-13]. ... Wireless Telephone Systems .... so there is a need for exact solutions and accurate calculations.

Staff List by Department with phone numbers 11.5.2015.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Staff List by ...

Dialogue Act Recognition with Bayesian Networks for ...
Dialogue Act Recognition with Bayesian Networks for Dutch Dialogues ... Department of Computer Science ... An important part of our dialogue systems for.

Face Tracking and Recognition with Visual Constraints in Real-World ...
... constrain term can be found at http://seqam.rutgers.edu/projects/motion/face/face.html. ..... [14] Y. Li, H. Ai, T. Yamashita, S. Lao, and M. Kawade. Tracking in.

Markovian Mixture Face Recognition with ... - Research at Google
Anonymous FG2008 submission ... (a) Domain-independent processing is cheap; and (b) For .... person are labelled during enrollment or registration, the D-.

Speech Recognition with Flat Direct Models
the hypothesis in the HMM-generated n-best list. ...... file storage to hold the data is taken as given). ... 2) Store this in a file with two columns: the word in one.

IMPROVED SYSTEM FUSION FOR KEYWORD ...
the rapid development of computer hardwares, it is possible to build more than .... and the web data of the OpenKWS15 Evaluation (denoted as. 202Web). 202VLLP ..... specificity and its application in retrieval,” Journal of documentation, vol.