• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lan Tian, Peng Chuan, Li Sen, Ye Wenzheng, Li Meng, Hui Guoqiang, Lü Yilan, Qian Yuxin, Liu Qiao. An Overview of Monaural Speech Denoising and Dereverberation Research[J]. Journal of Computer Research and Development, 2020, 57(5): 928-953. DOI: 10.7544/issn1000-1239.2020.20190306
Citation: Lan Tian, Peng Chuan, Li Sen, Ye Wenzheng, Li Meng, Hui Guoqiang, Lü Yilan, Qian Yuxin, Liu Qiao. An Overview of Monaural Speech Denoising and Dereverberation Research[J]. Journal of Computer Research and Development, 2020, 57(5): 928-953. DOI: 10.7544/issn1000-1239.2020.20190306

An Overview of Monaural Speech Denoising and Dereverberation Research

Funds: This work was supported by the National Natural Science Foundation of China (U19B2028, 61772117); the Big Data Application on Improving Government Governance Capabilities National Engineering Laboratory Open Fund Project (10-2018039), the Sichuan Hi-Tech Industrialization Program (2018GFW0150), and the Fundamental Research Funds for the Central Universities (ZYGX2019J077).
More Information
  • Published Date: April 30, 2020
  • Speech enhancement refers to the use of audio signal processing techniques and various algorithms to improve the intelligibility and quality of the distorted speech signals. It has great research value and a wide range of applications including speech recognition, VoIP, tele-conference and hearing aids. Most early work utilized unsupervised digital signal analysis methods to decompose the speech signal to obtain the characteristics of the clean speech and the noise. With the development of machine learning, some supervised methods which aim to learn the relationship between noisy and clean speech signals were proposed. In particular, the introduction of deep learning has greatly improved the performance. In order to help beginners and related researchers to understand the current research status of this topic, this paper conducts a comprehensive survey of the development process of the monaural speech enhancement, and systematically summarizes from the aspect of model methods, datasets, features, evaluation metrics, etc. First, we divide speech enhancement into noise reduction and de-reverberation, then respectively sort out the existing work of traditional and machine-learning-based methods in these two directions. Moreover, we briefly introduce the main ideas of typical solutions, and compare the performance of different methods. Then, commonly used datasets, features, learning objectives and evaluation metrics in experiments are enumerated and illustrated. Finally, four major challenges and corresponding issues in this area are summarized.
  • Related Articles

    [1]Zhao Xiaolei, Chen Zhaoyun, Shi Yang, Wen Mei, Zhang Chunyuan. Kernel Code Automatic Generation Framework on FT-Matrix[J]. Journal of Computer Research and Development, 2023, 60(6): 1232-1245. DOI: 10.7544/issn1000-1239.202330058
    [2]Ding Wenlong, Wang Chengning, Tong Wei. Energy-Efficient Floating-Point Memristive In-Memory Processing System Based on Self-Selective Mantissa Compaction[J]. Journal of Computer Research and Development, 2022, 59(3): 533-552. DOI: 10.7544/issn1000-1239.20210580
    [3]Wang Di, Shi Song, Wu Tiebin, Liu Liang, Tan Hongbing, Hao Ziyu, Guo Feng, Li Hongliang. A High Performance Accelerator Design for Ultra-Long Point Floating-Point FFT[J]. Journal of Computer Research and Development, 2021, 58(6): 1192-1203. DOI: 10.7544/issn1000-1239.2021.20210069
    [4]Xia Qing, Li Shuai, Hao Aimin, Zhao Qinping. Deep Learning for Digital Geometry Processing and Analysis: A Review[J]. Journal of Computer Research and Development, 2019, 56(1): 155-182. DOI: 10.7544/issn1000-1239.2019.20180709
    [5]Yu Kai, Yin Ming, Zong Xiaojie, Wang Yingguan, Wang Zhi. Compressive Sensing-Based Wireless Array and Collaborative Signal Processing Method[J]. Journal of Computer Research and Development, 2014, 51(1): 180-188.
    [6]Shen Huanghui, Wang Zhensong, Zheng Weimin. An Efficient Memory Access Strategy for Transposition and Block Operation in Image Processing[J]. Journal of Computer Research and Development, 2013, 50(1): 188-196.
    [7]Liu Duo, Dai Yiqi. Construction of Transformation Matrix with a Given Period Modulo N[J]. Journal of Computer Research and Development, 2012, 49(5): 925-931.
    [8]Wang Dong and Chen Shuming. DSCF: Data Streams Clustered Forwarding for Multi-Core DSPs with Memories Shared[J]. Journal of Computer Research and Development, 2008, 45(8): 1446-1553.
    [9]Sun Zhongwei, Feng Dengguo, Wu Chuankun. DWT Domain Blind Watermark Detection Based on Weak Signal Detection Theory[J]. Journal of Computer Research and Development, 2006, 43(11): 1920-1926.
    [10]Chen Shuming, Li Zhentao, Wan Jianghua, Hu Dinglei, Guo Yang, Wang Dong, Hu Xiao, and Sun Shuwei. Research and Development of High Performance YHFT Digital Signal Processor[J]. Journal of Computer Research and Development, 2006, 43(6): 993-1000.

Catalog

    Article views (2144) PDF downloads (1395) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return