Countercheck method for automatically identifying speaker aiming to voice deception

A speaker recognition and speaker technology, applied in speech analysis, instruments, etc., can solve problems such as fragile confrontation capabilities

Active Publication Date: 2015-12-09
SUN YAT SEN UNIV +1
View PDF7 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it has been recently reported that many existing speaker recognition systems are vulnerable to different spoofing attacks, such as: speaker-adaptive speech synthesis, voice conversion, voice playback, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Countercheck method for automatically identifying speaker aiming to voice deception
  • Countercheck method for automatically identifying speaker aiming to voice deception
  • Countercheck method for automatically identifying speaker aiming to voice deception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The drawings are for illustrative purposes only, and should not be construed as limitations on this patent; in order to better illustrate this embodiment, some parts in the drawings will be omitted, enlarged or reduced, and do not represent the size of the actual product;

[0058] For those skilled in the art, it is understandable that some well-known structures and descriptions thereof may be omitted in the drawings. The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0059] ⅣExperimental results

[0060] Table 1 shows the experimental results of the 4 subsystems on the development data. It can be observed that fusing PPP features at the feature level improves the performance. Compared with the MFCCi-vector subsystem (EER=6.63%), the error rate of MFCC-PPPi-vector is reduced by 1.06%. On the other hand, the results of the OpenSmile feature are better than those of the MFCCi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a countercheck method for automatically identifying a speaker aiming to voice deception, which is a voice anti-spoofing technology based on a method combining various features and a plurality of sub-systems. According to the invention, the serial features of the posterior probability of a phoneme in the phonological level and the MFCC features of voice level or MFDCC features of phase level are combined, thus the performance of the system is significantly enhanced. By combining the provided i-vector sub-system and OpenSMILE (open Speech and Music Interpretation by Large Space Extraction criterion containing voice and rhythmic information, the final presentation of the system is further enhanced. To a back-end model, the development datum are used; and under the situation of knowing deceptive attacks, a two-level support vector machine has better performance compared with one-level cosine similarity or PLDA evaluations, while the one-level evaluation approach has better robustness under the situation without seeing the test datum and knowing the deceptive conditions.

Description

technical field [0001] The invention relates to the field of automatic speaker recognition, and more particularly, relates to a countermeasure against speech deception in automatic speaker recognition. Background technique [0002] The purpose of speaker recognition is to automatically confirm the identity of a known speaker through a piece of speech. In the past decade, speaker recognition has attracted the attention of many researchers, and also achieved very remarkable results. However, it has been recently reported that many existing speaker recognition systems are vulnerable to different spoofing attacks, such as speaker-adaptive speech synthesis, voice conversion, and voice playback. [0003] Since the spoken content is restricted or pre-defined, text-based speaker recognition is more robust to voice playback spoofing attacks than text-independent speaker recognition. Speaker-adaptive voice synthesis and voice transformation are the most commonly used methods of dece...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L17/02G10L17/08G10L25/24
Inventor 李明翁时涛王尧
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products