Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voiceprint recognition attack defense method based on cuckoo search algorithm

A cuckoo search and voiceprint recognition technology, applied in the field of deep learning algorithms and information security research, can solve problems such as adversarial sample attacks, achieve high privacy, reduce search space, and improve search efficiency.

Active Publication Date: 2019-12-24
ZHEJIANG UNIV OF TECH
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention overcomes the security problem that the existing voiceprint recognition system is vulnerable to attack by adversarial samples, and provides a voiceprint recognition attack defense method based on the cuckoo search algorithm, which can efficiently generate adversarial samples to make the recognition system misidentify, And use the way of confrontational training to add the generated confrontational samples into the original training data set. The voiceprint recognition model after confrontational training can defend against the attack of confrontational samples and has higher security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voiceprint recognition attack defense method based on cuckoo search algorithm
  • Voiceprint recognition attack defense method based on cuckoo search algorithm
  • Voiceprint recognition attack defense method based on cuckoo search algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described in detail below with reference to the accompanying drawings and examples of the specification. It should be pointed out that the embodiments described below are intended to facilitate the understanding of the present invention and do not have any limiting effect on it.

[0029] Reference figure 1 with figure 2 , A voiceprint recognition attack defense method based on cuckoo search algorithm includes the following steps:

[0030] (1)Prepare the original audio data set: collect and preprocess the voice and audio of different speakers with different content, and divide it into a pre-training data set, a test data set and a disturbance data set used to generate adversarial samples according to a certain proportion. The specific process as follows.

[0031] Step1: Collect the audio that different speakers say certain content, that is, suppose there are a total of M different speakers and N different speaking content, then each sampl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a voiceprint recognition attack defense method based on a cuckoo search algorithm. The method comprises the following steps of (1) preparing a raw audio data set; (2) traininga voiceprint recognition model, wherein the voiceprint recognition model is trained by using a pre-training data set, and then a test data set is used to test the accuracy of the recognition model; (3) attacking the voiceprint recognition model, wherein an attack method based on the cuckoo search algorithm is built, a fitness function and related parameters of the attack method are set, and an optimal adversarial sample is generated by using the attack method and is mistakenly identified as a target category to be recognized by the human ears; and (4) performing adversarial training of the voiceprint recognition model, wherein the sample generated in the step (3) is added into the pre-training data set, and the voiceprint recognition model is re-trained, so that the re-trained voiceprint recognition model has the capability of defending attack of the adversarial sample, and the safety and stability of the voiceprint recognition model are improved.

Description

Technical field [0001] The invention belongs to the field of deep learning algorithms and information security research, and specifically relates to a voiceprint recognition system attack defense method based on a cuckoo algorithm. Background technique [0002] Voiceprint recognition, as a biometric technology, can effectively distinguish the voices of different people by extracting unique features in the speaker's voice. Because the voice containing voiceprint features is easy to obtain, and the recognition algorithm is relatively low in complexity, the voiceprint recognition system has a wide range of applications. The existing voiceprint recognition technology is divided into text-related and text-independent. The text-related voiceprint recognition model requires users to pronounce according to the specified content. Each person's voiceprint model is accurately established, but the recognition must also follow the specified content. Pronunciation can achieve a better recogni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G10L17/04G10L17/02G10L17/18G06N3/00G06N3/04H04L9/00
CPCG06N3/006G06N3/049G10L17/02G10L17/04G10L17/18H04L9/002
Inventor 陈晋音郑喆叶林辉
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products