About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Causal binary mask estimation for speech enhancement using sparsity constraints

In Proceedings of Meetings on Acoustics — 2013
From

Department of Electrical Engineering, Technical University of Denmark1

Hearing Systems, Department of Electrical Engineering, Technical University of Denmark2

Georgia Institute of Technology3

While most single-channel noise reduction algorithms fail to improve speech intelligibility, the ideal binary mask (IBM) has demonstrated substantial intelligibility improvements for both normal- and impaired-hearing listeners. However, this approach exploits oracle knowledge of the target and interferer signals to preserve only the time-frequency regions that are target-dominated.

Single-channel noise suppression algorithms trying to approximate the IBM using locally estimated signal-to-noise ratios without oracle knowledge have had limited success. Thought of in another way, the IBM exploits the disjoint placement of the target and interferer in time and frequency to create a time-frequency signal representation that is more sparse (i.e., has fewer non-zeros).

In recent work (submitted to ICASSP 2013) we have introduced a novel time-frequency masking algorithm based on a sparse approximation algorithm from the signal processing literature. However, the algorithm employs a non-causal estimator. The present work introduces an improved de-noising algorithm that uses more realistic frame-based (causal) computations to estimate a binary mask.

Language: English
Publisher: ASA
Year: 2013
Proceedings: 21st International Congress on Acoustics
Types: Conference paper
DOI: 10.1121/1.4800862
ORCIDs: Kressner, Abigail Anne

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis