Unlock instant, AI-driven research and patent intelligence for your innovation.

Voice spoofing detection method based on deep residual shrinkage network

A deception detection and residual technology, applied in the field of voice detection and deep learning, can solve problems such as performance regression, unknown attack generalization ability to be improved, training and application performance gap, etc., to achieve wide application scenarios and improve system generalization The effect of improving the learning ability of discriminative features

Pending Publication Date: 2022-05-13
HANGZHOU DIANZI UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the training performance of existing methods has been improved, they encounter unknown types of attacks in practical applications, and these attacks usually have a different statistical distribution from known attacks, resulting in a large performance gap between training and application, which shows that The generalization ability of deception detection system to unknown attacks still needs to be improved
In addition, due to the presence of noise, reverberation, and channel interference in real environments, various types of deception detection systems suffer from significant performance degradation in the face of complex acoustic environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice spoofing detection method based on deep residual shrinkage network
  • Voice spoofing detection method based on deep residual shrinkage network
  • Voice spoofing detection method based on deep residual shrinkage network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0032] In one embodiment, such as figure 1 As shown, a speech deception detection method based on deep residual shrinkage network is provided, including:

[0033] Step S1. Perform preprocessing on the speech to be detected, and transform the preprocessed speech feature data to obtain corresponding constant Q cepstral coefficient features, Mel frequency cepstral coefficient features and spectrogram features.

[0034] Such as figure 2 As shown, this step realizes feature extraction. First, the speech to be detected is divided into frames, and the pad filling operation is performed on the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a voice spoofing detection method based on a deep residual shrinkage network, and the method comprises the steps: firstly carrying out the preprocessing of a to-be-detected voice, carrying out the transformation of the preprocessed voice feature data, and obtaining a corresponding constant Q cepstrum coefficient feature, a Mel-frequency cepstrum coefficient feature and a spectrogram feature; respectively processing the constant Q cepstrum coefficient feature, the Mel frequency cepstrum coefficient feature and the spectrogram feature by adopting a deep residual shrinkage network to obtain three corresponding depth features; respectively inputting the three depth features into a deep neural network classifier, and calculating to obtain detection scores corresponding to the three depth features; finally, the detection scores corresponding to the three depth features are fused, and whether the voice to be detected is real voice or not is judged. According to the method, the discriminant feature learning ability in a complex acoustic environment is improved, the generalization of the system is improved, and the application scene is wider.

Description

technical field [0001] The application belongs to the technical field of voice detection and deep learning, and in particular relates to a voice deception detection method based on a deep residual shrinkage network. Background technique [0002] In recent years, the role of biometric-based identity authentication technology in data security and passability authentication has become more and more important. Due to the development of acquisition and sensing equipment, automatic speaker verification technology has received extensive attention and has been applied to smart device login, access control, online banking, etc. However, various voice forgery technologies threaten the security performance of automatic speaker verification systems. Four types of forged voice spoofing attacks have been identified: speech synthesis, voice conversion, voice imitation, and replay, which can generate fake voices similar to legitimate user voices. voice. Logical access attacks, which focus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G10L17/22G10L17/02G10L17/18G10L17/20G10L25/18G10L25/24G10L25/30
CPCG10L17/22G10L17/02G10L25/18G10L25/24G10L25/30G10L17/18G10L17/20
Inventor 章坚武周晔
Owner HANGZHOU DIANZI UNIV