Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Record replay attack detection method and system based on channel mode noise

A technology for replaying attack and pattern noise, which is applied in digital data information retrieval, speech analysis, speech recognition, etc. It can solve the problems of difficulty in determining the limit of replay attack, large storage space, and large calculation amount, and save storage space and calculation The effect of resource and feature dimension reduction and efficiency improvement

Inactive Publication Date: 2012-05-02
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are obvious defects in this method: 1. This algorithm can only be applied to the text-related speaker recognition system for recording and playback attack detection; The sample that the user enters the system every time must be compared with all stored samples, and the amount of calculation is very large; 4. If the recorded playback voice is not recorded when the user enters the system, such as privately recorded or obtained through syllable splicing, then this The method is invalid; 5. This method is highly dependent on the threshold setting. The speaker recognition itself is to compare the similarity. The judge with a high similarity is the same speaker. Therefore, the defense attack and the speaker's self-identification The bounds of the similarity threshold are hard to determine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Record replay attack detection method and system based on channel mode noise
  • Record replay attack detection method and system based on channel mode noise
  • Record replay attack detection method and system based on channel mode noise

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The implementation of the present invention will be further described below in conjunction with the drawings and embodiments, but the implementation of the present invention is not limited thereto.

[0047] The recording and playback attack detection method of the present invention can be realized in the embedded system according to the following steps:

[0048] Step (1), input training speech, which includes original speech signal and playback speech signal.

[0049] Step (2), preprocessing the input speech signal, including pre-emphasizing, framing and windowing the speech signal. Pre-emphasis is to perform high-pass filtering on the speech signal, and the transfer function of the filter is H(z)=1-az -1 , where a=0.975. For the framing of the voice signal, the frame length is 512 points, and the frame shift is 256 points. The window added to the speech signal is a Hamming window, where the function of the Hamming window is:

[0050] ω ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of intelligent voice signal processing, mode recognition and artificial intelligence and in particular relates to a record replay attack detection method and system in a speaker recognition system based on a channel mode noise. The invention discloses a simpler and more efficient record replay attack detection method in a speaker recognition system. The method comprises the following steps: (1) inputting a to-be-recognized voice signal; (2) pre-processing the voice signal; (3) extracting the channel mode noise in the pre-processed voice signal; (4) extracting a long time statistic feature based on the channel mode noise; and (5) classifying the long time statistic feature according to a channel noise classifying judging model. By using the channel mode noise to perform the record replay attack detection, the extracted feature dimension is low, the computation complexity is low, and the recognition error rate is low, therefore, the safety performance of the speaker recognition system is greatly improved, and the method and system provided by the invention can be used in the reality more easily.

Description

technical field [0001] The invention relates to the technical fields of intelligent voice signal processing, pattern recognition and artificial intelligence, in particular to a recording playback attack detection method and system in a speaker recognition system based on channel pattern noise. Background technique [0002] With the continuous development of speaker recognition technology, speaker recognition systems have been widely used, such as: judicial evidence collection, e-commerce, financial systems, etc. At the same time, some security problems faced by the speaker recognition system restrict its development and application. Two common attacks faced by speaker recognition systems are speaker impersonation attack and recording playback attack. Speaker spoofing attack refers to the attacker attacking the system by imitating the user's voice in the speaker recognition system. The speaker recognition experiment on the twin voice database shows that the existing speaker...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G10L15/02G10L15/06G10L15/08G10L25/48
CPCG06F17/30G10L15/20G10L15/00
Inventor 贺前华王志锋罗海宇陈芬
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products