Unlock instant, AI-driven research and patent intelligence for your innovation.

A voiceprint recognition attack defense method based on cuckoo search algorithm

A cuckoo search and voiceprint recognition technology, applied in the field of deep learning algorithms and information security research, can solve problems such as adversarial sample attacks, achieve high privacy, reduce search space, and improve search efficiency.

Active Publication Date: 2021-10-15
ZHEJIANG UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention overcomes the security problem that the existing voiceprint recognition system is vulnerable to attack by adversarial samples, and provides a voiceprint recognition attack defense method based on the cuckoo search algorithm, which can efficiently generate adversarial samples to make the recognition system misidentify, And use the way of confrontational training to add the generated confrontational samples into the original training data set. The voiceprint recognition model after confrontational training can defend against the attack of confrontational samples and has higher security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A voiceprint recognition attack defense method based on cuckoo search algorithm
  • A voiceprint recognition attack defense method based on cuckoo search algorithm
  • A voiceprint recognition attack defense method based on cuckoo search algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be described in further detail below in conjunction with the accompanying drawings and examples in the specification. It should be noted that the following examples are intended to facilitate understanding of the present invention, and do not have any limiting effect on it.

[0029] refer to figure 1 and figure 2 A method for defending against voiceprint recognition attacks based on the cuckoo search algorithm comprises the following steps:

[0030] (1) Prepare the original audio data set: collect the voice audio of different speakers speaking different content and perform preprocessing, and divide it into a pre-training data set, a test data set and a disturbance data set for generating adversarial samples according to a certain ratio. The specific process as follows.

[0031] Step1: Collect the audio of different speakers saying certain content, that is, if there are M different speakers and N different speech contents, each sample can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A voiceprint recognition attack defense method based on the cuckoo search algorithm, including: (1) preparing the original audio data set; (2) training the voiceprint recognition model: using the pre-trained data set to train the voiceprint recognition model, and then using Test data set to test the accuracy of the recognition model; (3) Attack the voiceprint recognition model: build an attack method based on the cuckoo search algorithm, set the fitness function and related parameters of the attack method; use the attack method to generate the optimal adversarial sample, Make it be misidentified as the target category and not be recognized by the human ear; (4) confrontation training voiceprint recognition model: add the samples generated in step (3) to the pre-training data set, retrain the voiceprint recognition model, so that the new The trained voiceprint recognition model has the ability to defend against adversarial sample attacks, improving the security and stability of the voiceprint recognition model.

Description

technical field [0001] The invention belongs to the field of deep learning algorithms and information security research, and in particular relates to an attack defense method for a voiceprint recognition system based on a cuckoo algorithm. Background technique [0002] As a biometric technology, voiceprint recognition can effectively distinguish the voices of different people by extracting the unique features of the speaker's voice. Since the speech containing voiceprint features is easy to obtain, and the recognition algorithm complexity is low, the voiceprint recognition system has a wide range of applications. The existing voiceprint recognition technology is divided into text-related and text-independent. The text-related voiceprint recognition model requires the user to pronounce according to the specified content. The voiceprint model of each person is accurately established, but the recognition must also follow the specified content. Pronunciation can achieve a bette...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G10L17/04G10L17/02G10L17/18G06N3/00G06N3/04H04L9/00
CPCG06N3/006G06N3/049G10L17/02G10L17/04G10L17/18H04L9/002
Inventor 陈晋音郑喆叶林辉
Owner ZHEJIANG UNIV OF TECH