By continuing to browse this website, you implicitly agree with our Legal Disclaimer

Bob 2.0 computation of GMM statistics

This algorithm is a **legacy** one. The API has changed since its implementation. New versions and forks will need to be updated.

This algorithm is **splittable**

Algorithms have at least one
**input** and one **output**. All
algorithm endpoints are organized in **groups**.
Groups are used by the platform to indicate which inputs and
outputs are synchronized together. The first group is
automatically synchronized with the channel defined by the
block in which the algorithm is deployed.

Endpoint Name | Data Format | Nature |
---|---|---|

features | system/array_2d_floats/1 | Input |

statistics | tutorial/gmm_statistics/1 | Output |

Endpoint Name | Data Format | Nature |
---|---|---|

ubm | tutorial/gmm/1 | Input |

The code for this algorithm in Python

The ruler at 80 columns indicate suggested POSIX line breaks (for readability).

The editor will automatically enlarge to accomodate the entirety of your input

Use keyboard shortcuts for search/replace and faster editing. For example, use Ctrl-F (PC) or Cmd-F (Mac) to search through this box

For a given set of feature vectors and a Gaussian Mixture Model (GMM), this algorithm computes the 0_{th}, 1_{st} and 2_{nd} order GMM Statistics (Baum-Welch) relying on Bob implementation.

This algorithm relies on the Bob library.

The inputs are:

- features: A set of floating point vectors as a two-dimensional array (64 bits) of a client. The number of rows correspond to the number of samples, and the number of columns to the dimensionality of the samples.
- ubm: A GMM corresponding to the Universal Background Model.

The output are the statistics of the GMM of a given set of feature vectors (MAP adaptation).

Updated | Name | Databases/Protocols | Analyzers | |||
---|---|---|---|---|---|---|

pkorshunov/pkorshunov/isv-asv-pad-fusion-complete/1/asv_isv-pad_lbp_hist_ratios_lr-fusion_lr-pa_aligned | avspoof/2@physicalaccess_verification_spoof,avspoof/2@physicalaccess_verify_train_spoof,avspoof/2@physicalaccess_verification,avspoof/2@physicalaccess_antispoofing,avspoof/2@physicalaccess_verify_train | pkorshunov/spoof-score-fusion-roc_hist/1 | ||||

pkorshunov/pkorshunov/isv-asv-pad-fusion-complete/1/asv_isv-pad_gmm-fusion_lr-pa | avspoof/2@physicalaccess_verification_spoof,avspoof/2@physicalaccess_verify_train_spoof,avspoof/2@physicalaccess_verification,avspoof/2@physicalaccess_antispoofing,avspoof/2@physicalaccess_verify_train | pkorshunov/spoof-score-fusion-roc_hist/1 | ||||

pkorshunov/pkorshunov/isv-speaker-verification-spoof/1/isv-speaker-verification-spoof-pa | avspoof/2@physicalaccess_verification_spoof,avspoof/2@physicalaccess_verification | pkorshunov/eerhter_postperf_iso_spoof/1 | ||||

pkorshunov/pkorshunov/isv-speaker-verification/1/isv-speaker-verification-licit | avspoof/2@physicalaccess_verification | pkorshunov/eerhter_postperf_iso/1 |

This table shows the number of times this algorithm
has been **successfully** run using the given environment. Note
this does not provide sufficient information to evaluate if the
algorithm will run when submitted to different conditions.

Terms of Service | Contact Information | BEAT platform version 1.3.1rc1 | © Idiap Research Institute - 2013-2019