Unlock instant, AI-driven research and patent intelligence for your innovation.

Voice channel user verification method and system based on fmcw and feature expression migration

A verification method and channel technology, applied in the field of information security, can solve problems such as monitoring and replay attacks

Active Publication Date: 2020-01-21
SHANGHAI JIAOTONG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods are vulnerable to snooping and replay attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice channel user verification method and system based on fmcw and feature expression migration
  • Voice channel user verification method and system based on fmcw and feature expression migration
  • Voice channel user verification method and system based on fmcw and feature expression migration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Such as figure 1 As shown, the specific implementation process of this embodiment includes: a registration phase and a login phase.

[0019] ① Registration stage:

[0020] 1.1) The user dictates a predefined password several times in a quiet environment, and at the same time, the mobile terminal used for registration continuously sends out the FMCW signal as the carrier signal through the loudspeaker, and uses the microphone to receive the sound wave signal reflected by various objects in the environment as the modulated voice signal.

[0021] 1.2) Preprocess the received acoustic wave signal and obtain the speaking state signal, use the FMCW method to demodulate the speaking state signal and extract the authenticator's vocal tract behavior characteristics from it.

[0022] 1.3) Transfer the vocal tract behavior features to speech features through the codec neural network.

[0023] 1.4) Utilize the speech-based user authentication model to construct a user authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sound channel user authentication method based on an FMCW (frequency modulation continuous wave) and feature expression migration. An FMCW technology is used for collecting amodulated speech signal containing sound channel behavior characteristics, after pre-processing and feature extraction, a frequency difference sequence containing the sound channel behavior characteristics is obtained, then the frequency difference sequence containing the sound channel behavior characteristics is migrated to speech characteristics by a coded and decoded neural network, and a userauthentication model is constructed to realize registration and authentication of a sound channel user. The sound channel user authentication method directly adopts the user authentication model based on the speech vocal print, and only a small number of data are needed to achieve satisfactory performance.

Description

technical field [0001] The present invention relates to a technology in the field of information security, in particular to a channel user authentication method and system based on frequency modulated continuous wave (FMCW) and feature expression migration. Background technique [0002] With the increase of storage of user private information in mobile devices, user authentication systems for mobile devices have attracted more and more people's attention. Existing mobile user authentication based on technologies such as fingerprint and facial recognition have been widely deployed on mobile devices. However, these methods have been proven to be subject to replay attacks, that is, attacks using fingerprint films or pre-recorded videos / pictures. At the same time, these methods are also vulnerable to the influence of the surrounding environment, such as the state of the finger, and the influence of ambient light. As a natural and widespread behavior, speaking behavior has been...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G10L17/00G10L17/06G10L17/18G10L25/24G06F21/32
CPCG06F21/32G10L17/00G10L17/06G10L17/18G10L25/24
Inventor 俞嘉地卢立孔浩李明禄
Owner SHANGHAI JIAOTONG UNIV