Speaker speech spoofing attack detection method and system based on deep learning

A technology of spoofing attack and detection method, which is applied in speech analysis, speech recognition, instruments, etc. It can solve the problems of poor robustness, inability to accurately represent the discriminative features of spoofed speech and real speech, poor recognition effect, etc., and achieve accuracy improvement , widening the gap, the effect of robustness

Active Publication Date: 2019-08-02
AISPEECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims at the existing traditional voice spoofing attack detection method, which has the limitations of feature extraction that cannot accurately characterize the discriminative features between spoofed voice and real voice, dynamic features of lost voice signals, poor robustness, and poor recognition effect. In the feature extraction stage, the deep learning model is used to extract the feature vector, two different frameworks: frame-level feature representation based on deep feed-forward neural network And the sequence-level feature representation based on deep recurrent neural network, which can not only capture local features, but also grasp global information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Speaker speech spoofing attack detection method and system based on deep learning
  • Speaker speech spoofing attack detection method and system based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This example is tested with the newly released ASVSpoof2015 dataset, and compared with the existing baseline method, the results are shown in Table 1. It can be seen that the method proposed by the present invention can achieve the best result so far.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for detecting voice spoofing attack of speakers on the basis of deep learning. The method includes constructing audio-frequency training sets, initializing deep feed-forward neural networks and deep recurrent neural networks and respectively training the deep feed-forward neural networks and the deep recurrent neural networks by the aid of multi-frame feature vectors and single-frame vector sequences of the training sets; respectively leading frame level and sequence level feature vectors of to-be-tested audio frequencies into two trained linear differential analysis models in test phases, weighting two obtained result grades to obtain scores and comparing the scores to predefined threshold values so as to discriminate voice spoofing. The method and the system have the advantages that local features can be captured, and global information can be grasped; the linear differential analysis models are used as classifiers in identification and verification phases, the voice spoofing attack can be judged by means of grade fusion, and accordingly the voice spoofing detection accuracy can be greatly improved.

Description

technical field [0001] The present invention relates to a technology in the field of intelligent speech, in particular to a method and system for detecting speaker speech spoofing attacks based on deep learning. Background technique [0002] Speech spoofing attack refers to the technology of forging the voice of a specific target to attack the automatic speaker recognition system. Speaker recognition technology has been widely used in many fields, such as: identity verification, Internet security, human-computer interaction, banking and securities systems, military criminal investigation, etc. In recent years, attacks on speaker recognition systems are mainly divided into four categories, namely imitation attacks, recording playback, speech synthesis, and speech conversion. Research shows that the main problem of traditional speech spoofing attack detection lies in feature extraction, and existing feature extraction methods have many shortcomings in terms of expressiveness ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G10L15/06G10L15/14G10L15/16
CPCG10L15/063G10L15/14G10L15/16
Inventor 钱彦旻陈楠昕俞凯
Owner AISPEECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products