Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Spoofing detection apparatus, spoofing detection method, and computer-readable storage medium

A deception detection, computer technology, applied in speech analysis, instruments, etc., can solve the problem of ASV being vulnerable to deception, and achieve the effect of suppressing misrecognition

Pending Publication Date: 2022-02-11
NEC CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Like any other biometric, ASV is susceptible to spoofing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Spoofing detection apparatus, spoofing detection method, and computer-readable storage medium
  • Spoofing detection apparatus, spoofing detection method, and computer-readable storage medium
  • Spoofing detection apparatus, spoofing detection method, and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Each exemplary embodiment of the present invention will be described below with reference to the accompanying drawings. The following detailed description is merely exemplary in nature and is not intended to limit the invention or the application and uses of the invention. Furthermore, there is no intention to be bound by any theory presented in the preceding background of the invention or the following detailed description.

(Content of invention)

[0038] The invention fuses CQT and fast Fourier transform (FFT) spectrograms as multi-channel input in the neural network, so as to complement each other and ensure the robustness of the fraud detection system.

[0039] According to the present invention, the spoof detection apparatus, method and program of the present invention can provide a more accurate and robust representation of speech utterances for spoof detection. This is because the present invention provides a new fusion of multiple spectrograms as a multi-chan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A spoofing detection apparatus100 includes a multi-channel spectrogram creation unit 10 and an evaluation unit 40. The multi-channel spectrogram creation unit 10 extracts different type of spectrograms from speech data and integrates the different type of spectrograms to create a multi-channel spectrogram. The evaluation unit 40 evaluates the created multi-channel spectrogram by applying the created multi-channel spectrogram to a classifier constructed using labeled multi-channel spectrograms as training data and classifies it to either genuine or spoof.

Description

technical field [0001] The present invention relates to an apparatus and method for detecting spoofing from speech, and a computer-readable storage medium storing a program for implementing the same. Background technique [0002] Speaker recognition refers to identifying a person from their voice. Automatic Speaker Verification (ASV) provides a flexible biometric solution for personal authentication. It has been increasingly used in forensics, phone-based services such as phone banking, call centers, and many mass-market consumer products. [0003] However, the applicability of ASV technology depends on its resilience to deliberate evasion, known as spoofing. Like any other biometric, ASV is vulnerable to spoofing. Confirmed spoofing attacks against ASV include emulation, replay, text-to-speech synthesis, and voice conversion (e.g., NPL 1). Fraudsters can use spoofing attacks to infiltrate systems or services secured using biometrics. [0004] Therefore, anti-spoofing t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G10L17/26G10L25/51G10L17/18
CPCG10L17/26G10L17/18G10L25/51G10L17/04G10L17/06G10L25/18
Inventor 王琼琼李功益越仲孝文
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products