Recording attack prevention voiceprint recognition method and device and access control system

An authentication method and technology of an authentication device are applied in the field of voiceprint authentication of access control systems and anti-recording attacks, which can solve the problems of low accuracy of speech recognition and dependence on specified text, and achieve the effect of improving accuracy and reducing requirements.

Active Publication Date: 2018-05-15
SPEAKIN TECH CO LTD
View PDF12 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a voiceprint authentication method, device, and access control system for preventing recording attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recording attack prevention voiceprint recognition method and device and access control system
  • Recording attack prevention voiceprint recognition method and device and access control system
  • Recording attack prevention voiceprint recognition method and device and access control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Embodiments of the present invention provide a voiceprint authentication method, device, and access control system for preventing recording attacks, which are used to solve the technical problems of low voice recognition accuracy and reliance on specified text in existing speaker recognition systems.

[0042] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] see figure 1 , an emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a recording attack prevention voiceprint recognition method and device and an access control system. The method comprises the following steps of obtaining an audio to be detected; extracting a first MFCC feature vector, a first GFCC feature vector and a first CQCC feature vector of the audio to be detected; synthesizing the first MFCC feature vector, the first GFCC featurevector and the first CQCC feature vector; obtaining the first acoustic feature vector of the audio to be detected; performing matching degree comparison on the first acoustic feature vector, a recording acoustic feature model obtained through the training by an SVM classifier in the preset training template base and a real voice acoustic feature model; judging whether the first matching degree ofthe first acoustic feature vector and the recording acoustic feature vector model is greater than or equal to the second matching degree of the first acoustic feature and the real voice acoustic feature vector model or not; if so, judging that the audio to be detected is the recording audio; if not, judging that the audio to be detected is the real voice audio. The technical problems that the existing speaker recognition system has low voice recognition accuracy and relies on the specific text are solved.

Description

technical field [0001] The invention relates to the technical field of voice authentication, in particular to a voiceprint authentication method, device and access control system for preventing recording attacks. Background technique [0002] With the development of information technology, some technical means of undermining security are also constantly improving. At present, the attack means of impersonating the identity of the speaker and recording the speaker's voice are the most common attack means faced by the speaker recognition system. The means of impersonating the speaker's identity is generally to use some techniques such as imitating the speaker's pronunciation habits and intonation to try to impersonate the speaker's identity to enter the speaker recognition system. [0003] Recording attack is a technical method that uses high-fidelity recording equipment to record the voice of the target person, and then uses the recorded audio to crack the voiceprint authentic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L17/06G10L25/24G07C9/00
CPCG10L17/06G10L25/24G07C9/37
Inventor 郑渊中
Owner SPEAKIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products