Music embedding attack defense method for voice recognition system

A speech recognition and speech recognition model technology, applied in speech recognition, speech analysis, instruments, etc., can solve problems such as large amount of calculation, achieve good dissemination, great security risks, and protect personal privacy and personal safety.

Active Publication Date: 2020-06-09
ZHEJIANG UNIV OF TECH
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Commonly used speech recognition defense methods include confrontation training. By adding confrontation samples to the training data set and retraining the model, the model has the ability to defend against confrontation samples. Since the above attack method is to add interference to specific audio, a large amount of audio processing needs to be generated. Adversarial examples require a large amount of calculations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Music embedding attack defense method for voice recognition system
  • Music embedding attack defense method for voice recognition system
  • Music embedding attack defense method for voice recognition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0030] refer to Figure 1-Figure 2 A method for defending against music embedding attacks for speech recognition systems comprises the following steps:

[0031] (1) Data set preparation and preprocessing: collect the music audio required for the experiment, divide it into a pre-training data set and a disturbance data set for generating adversarial samples, cut the collected music audio and process it into a data stream format;

[0032] (2) Training speech recognition model: use the processed music audio data set to train the speech recognition model, so that the model ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A music embedding attack defense method for a voice recognition system comprises the following steps: (1) preparing a data set and preprocessing; (2) training a voice recognition model; (3) pre-training a generative adversarial network; (4) retraining the generative adversarial network; (5) generating an adversarial sample; and (6) performing adversarial training. According to the invention, musicaudios are generated through the generative adversarial network; a transcription result of the adversarial audio is obtained by using the voice recognition model, and a target function is set by using the loss between the transcription result and the target phrase and the discrimination result of a discriminator to optimize a generator, so that the generated adversarial audio cannot be recognizedby human ears and is transcribed into the target phrase; and the capability of the speech recognition system in defending against sample attack is improved through adversarial training.

Description

technical field [0001] The invention relates to a GAN-based attack defense method for a music-embedded speech recognition system. Background technique [0002] At present, deep learning has been widely used in image recognition, speech recognition, data generation and other fields. The generative adversarial network is one of the commonly used models in the field of deep learning. Through the mutual game learning of the generative model and the discriminant model, better results can be output. [0003] The speech recognition system based on deep learning has brought great convenience to people's daily production and life, but it is also vulnerable to hidden attacks. By adding disturbances that cannot be detected by the human ear to the original audio, the audio transcription results can occur If the attacker carefully designs the perturbation to make the generated adversarial samples transcribe into the target phrase, it will very likely damage the user's personal privacy a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L15/06G10L15/16G10L15/20G10L15/26
CPCG10L15/063G10L15/16G10L15/20G10L15/26
Inventor 陈晋音郑喆叶林辉
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products