Voice cutting trace positioning method based on double-domain depth features and attention mechanism

A technology of deep features and localization methods, applied in speech analysis, instruments, etc., can solve the problem that there is no good method to detect clipping marks and so on

Pending Publication Date: 2022-04-22
SHENZHEN UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, there is no good way to detect whether there is a cropping trace on a suspicious recording, and to locate the cropping area

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice cutting trace positioning method based on double-domain depth features and attention mechanism
  • Voice cutting trace positioning method based on double-domain depth features and attention mechanism
  • Voice cutting trace positioning method based on double-domain depth features and attention mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0064] In recent years, the emergence of digital audio editing software has enabled some users who do not have knowledge of speech signal processing to easily process digital audio, so digital audio editing software has attracted a large number of users. With these convenient audio editing software, criminals can easily delete some words in a recording to generate fake voices with completely different semantics. These fake voices are very likely to be used as evidence in court, or spread among the general public, causing a series of security issues.

[0065] In the prior art, detecting ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a voice cutting trace positioning method based on double-domain depth features and an attention mechanism, and the method comprises the steps: obtaining a voice signal, carrying out the decompression and framing processing of the voice signal, calculating the discrete cosine transform of each voice frame, and obtaining the discrete cosine transform coefficient of each voice frame; extracting a time domain depth feature of each voice frame through a feature extraction sub-network of the one-dimensional convolutional neural network; extracting a frequency domain depth feature of a discrete cosine transform domain of each voice frame through a feature extraction sub-network based on a capsule network; splicing and fusing the double-domain depth features of each voice frame through a feature fusion full-connection layer to obtain a fused depth feature of each voice frame; and through a positioning module based on a multi-head attention mechanism, capturing contextual information fused with depth features, and positioning adaptive filtering traces in the cut voice. Whether the cutting trace exists on a section of suspicious recording or not is rapidly detected, and the cutting area is positioned.

Description

technical field [0001] The invention relates to the technical field of audio forensics in multimedia information security, in particular to a voice clipping trace positioning method based on a dual-domain depth feature and an attention mechanism. Background technique [0002] In recent years, the emergence of digital audio editing software has enabled some users who do not have knowledge of speech signal processing to easily process digital audio, so digital audio editing software has attracted a large number of users. With these convenient audio editing software, criminals can easily delete some words in a recording, thereby generating fake voices with completely different semantics. These fake voices are very likely to be used as evidence in court, or spread among the general public, causing a series of security issues. [0003] In the prior art, there is no good method to detect whether there is a clipping trace on a suspicious recording, and to locate the cropped area. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L17/04G10L25/03G10L25/30G10L25/48
CPCG10L25/30G10L17/04G10L25/03G10L25/48
Inventor 黄远坤李斌谭舜泉黄继武
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products