A voiceprint recognition attack defense method based on cuckoo search algorithm
A cuckoo search and voiceprint recognition technology, applied in the field of deep learning algorithms and information security research, can solve problems such as adversarial sample attacks, achieve high privacy, reduce search space, and improve search efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The present invention will be described in further detail below in conjunction with the accompanying drawings and examples in the specification. It should be noted that the following examples are intended to facilitate understanding of the present invention, and do not have any limiting effect on it.
[0029] refer to figure 1 and figure 2 A method for defending against voiceprint recognition attacks based on the cuckoo search algorithm comprises the following steps:
[0030] (1) Prepare the original audio data set: collect the voice audio of different speakers speaking different content and perform preprocessing, and divide it into a pre-training data set, a test data set and a disturbance data set for generating adversarial samples according to a certain ratio. The specific process as follows.
[0031] Step1: Collect the audio of different speakers saying certain content, that is, if there are M different speakers and N different speech contents, each sample can be...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


