浏览全部资源
扫码关注微信
[ "李璨(1992-),女,宁波大学信息科学与工程学院硕士生,主要研究方向为多媒体通信与信息安全等。" ]
[ "王让定(1962-),男,博士,宁波大学高等技术研究院教授、博士生导师,主要研究方向为多媒体通信与取证、信息隐藏与隐写分析、智能抄表及传感网络技术等。" ]
[ "严迪群(1979-),男,博士,宁波大学信息科学与工程学院副教授、硕士生导师,主要研究方向为多媒体通信、信息安全、基于深度学习的数字语音取证等。" ]
[ "陈亚楠(1990-),女,宁波大学信息科学与工程学院硕士生,主要研究方向为多媒体通信与信息安全等。" ]
网络出版日期:2017-08,
纸质出版日期:2017-08-15
移动端阅览
李璨, 王让定, 严迪群, 等. 基于相位谱的翻录语音攻击检测算法[J]. 电信科学, 2017,33(8):145-154.
Can LI, Rangding WANG, Diqun YAN, et al. Recapture voice replay detection based on phase spectrum[J]. Telecommunications science, 2017, 33(8): 145-154.
李璨, 王让定, 严迪群, 等. 基于相位谱的翻录语音攻击检测算法[J]. 电信科学, 2017,33(8):145-154. DOI: 10.11959/j.issn.1000-0801.2017126.
Can LI, Rangding WANG, Diqun YAN, et al. Recapture voice replay detection based on phase spectrum[J]. Telecommunications science, 2017, 33(8): 145-154. DOI: 10.11959/j.issn.1000-0801.2017126.
因与原始语音具有高度相似性,经高保真设备回放的翻录语音常被不法分子用于对说话人认证(ASV)系统进行攻击,以达到非法认证的目的。为提高系统抵抗翻录语音攻击的顽健性,通过研究原始语音与翻录语音产生的实际过程,发现两者在频率域相位上有明显差异,并在此基础上提出了一种基于相位谱的翻录语音检测方法。分析讨论了FFT和不同偷录、回放设备对翻录语音检测率的影响。实验结果表明,该方法能够准确地判断待测语音是否为翻录语音,其检测率达到了99.04%。并且,将该算法加载到说话人识别系统中,使系统的等错误概率(EER)降低了约22%,有效提高了系统抵抗翻录语音攻击的性能。
Due to a high similarity between the recaptured voice recorded by high-fidelity ripping equipment and the original voice
the automatic speaker verification(ASV)system used to be attacked illegally by the recaptured voice.In order to improve the ability of resisting the attack
a recaptured voice detection method was proposed based on the difference of phase spectrum between original and recaptured voices for the ASV system.In addition
the effects of different recording and replay devices
the FFT were discussed.Experimental results show that the proposed method can accurately recognize the recording voice
of which detection rate is 99.04%。Meanwhile
the equal error rate (EER) of the ASV system has dropped about 22% with this method being integrated
which indicates that the system’s ability of resisting playback attack is enhanced.
SHANG W , STEVENSON M . A playback attack detector for speaker verification systems [C ] // 2008 IEEE International Symposium on Communications Control and Signal Processing (ISCCSP),March 12-14,2008,Bordeaux,France . New Jersey:IEEE Press , 2008 : 1144 - 1149 .
SHANG W , STEVENSON M . Score normalization in playback attack detection [C ] // IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) ,March 14-19,2008,Dallas,USA . New Jersey:IEEE Press , 2010 : 1678 - 1681 .
JAKUB G , MARCIN G , RAFAL S . Playback attack detection for text-dependent speaker verification over telephone channels [J ] . Speech Communication , 2015 ( 67 ): 143 - 153 .
WU Z , GAO S , CLING E S , et al . A study on replay attack and anti-spoofing for text-dependent speaker verification [C ] // IEEE 2014 Summit and Conference,Asia-Pacific Signal and Information Processing Association,December 9-12,2014,Siem Reap,Cambodia . New Jersey:IEEE Press , 2014 : 35 - 45 .
张利鹏 , 曹犟 , 徐明星 . 防止假冒者闯入说话人识别系统 [J ] . 清华大学学报(自然科学版) , 2008 , 48 ( S1 ): 699 - 703 .
ZHANG L P , CAO J , XU M X . Prevention of impostors enter-ing speaker recognition systems [J ] . Journal of Tsinghua univer-sity (Science and Technology ) , 2008 , 48 ( S1 ): 699 - 703 .
王志锋 , 贺前华 , 张雪源 , 等 . 基于模式噪声的录音回放攻击检测 [J ] . 华南理工大学学报 , 2011 , 39 ( 10 ): 7 - 12 .
WANG Z F , HE Q H , ZHANG X Y , et al . Channel pattern noise based playback detection algorithm speaker recognition [J ] . Journal of South China University of Technology(Natural Science Edition) , 2011 , 39 ( 10 ): 7 - 12 .
WANG Z F , HE Q H , ZHANG X Y , et al . Channel pattern noise based playback detection algorithm speaker recognition [C ] // IEEE International Conference on Machine Learning and Cybernetics(ICMLC),July 10-13,2011,Guilin,China . New Jersey:IEEE Press , 2011 : 1708 - 1713 .
VILLABA J , LLEIDA E . Detecting replay attacks from far-field recordings on speaker verification systems [C ] // COST 2011 European Conference on Biometrics and ID Management,March 8-10,2011,Brandenburg,Germany . New York:ACM Press , 2011 : 274 - 285 .
VILLABA J , LLEIDA E . Preventing replay attacks on speaker verification systems [C ] // IEEE International Carnahan Conference on Security Technology (ICCST),October 18-21,2011,San Francisco,USA . New Jersey:IEEE Press , 2011 : 1 - 8 .
CHEN Y N , WANG R D , YAN D Q , et al . Voice playback detection based on long-window scale-factors [J ] . International Journal of Security and Its Application , 2016 , 10 ( 12 ): 299 - 310 .
郑志彬 . 信息网络安全威胁及技术发展趋势 [J ] . 电信科学 , 2009 , 25 ( 2 ): 28 - 34 .
ZHENG Z B . Overview of mobile communication services se-curity [J ] . Telecommunications Science , 2009 , 25 ( 2 ): 28 - 34 .
王帅 , 汪来富 , 金华敏 , 等 . 网络安全分析中的大数据技术应用 [J ] . 电信科学 , 2015 , 31 ( 7 ): 145 - 150 .
WANG S , WANG L F , JIN H M , et al . Big data application in network security analysis [J ] . Telecommunications Science , 2015 , 31 ( 7 ): 145 - 150 .
OPPENHERIM A V , LIM J S . The important of phase in signals [J ] . Processing of the IEEE , 1981 , 69 ( 5 ): 529 - 541 .
DUAN K B , RAJAPAKSE J C , WANG H Y , et al . Multiple SVM-RFE for gene selection in cancer classification with expression data [J ] . IEEE Transactions on Nano Bioscience , 2005 , 4 ( 3 ): 228 - 234 .
王天庆 , 李爱军 . , 等 . 连续汉语语音识别语料库的设计 [C ] // 第六届全国现代语音学学术会议论文集(下),2003年10月18-20日,天津,中国 . 天津:天津人民出版社 , 2003 .
WANG T Q , LI A J . The design of the continuous Chinese speech recognition corpus [C ] // The sixth national conference on modern phonetics learning,October 18-20,2003,Tianjin,China,Tianjin:Tianjin Remin Chubanshe , 2003 .
杨震 , 徐敏捷 , 刘璋峰 , 等 . 语音大数据信息处理架构及关键技术研究 [J ] . 电信科学 , 2013 , 29 ( 11 ): 1 - 5 .
YANG Z , XU M J , LIU Z F , et al . Study of audio frequency big data processing architecture and key technology [J ] . Telecommunications Science , 2013 , 29 ( 11 ): 1 - 5 .
CHAKROBORTY S , ROY A , SAHA G . Improved closed set text-independent speaker identification by combining MFCC with evidence from flipped filter banks [J ] . International Journal of Signal Processing , 2007 , 4 ( 2 ): 114 - 122 .
KANAGASUNDARAM A , DEANA D , SRIDHARAN S , et al . I-vector based speaker recognition using advanced channel compensation techniques [J ] . Computer Speech and Language , 2014 , 28 ( 1 ): 121 - 140 .
0
浏览量
698
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构