浏览全部资源
扫码关注微信
1. 杭州电子科技大学通信工程学院,浙江 杭州 310018
2. 杭州电子科技大学网络空间安全学院,浙江 杭州 310018
[ "徐剑(1995− ),男,杭州电子科技大学通信工程学院硕士生,主要研究方向为语音处理和语音伪装检测" ]
[ "简志华(1978− ),男,博士,杭州电子科技大学通信工程学院副教授、硕士生导师,主要研究方向为语音转换、伪装语音检测、声纹识别等" ]
[ "于佳祺(1997− ),男,杭州电子科技大学通信工程学院硕士生,主要研究方向为语音伪装检测、特征提取与分析" ]
[ "金易帆(1996− ),男,杭州电子科技大学网络空间安全学院硕士生,主要研究方向为语音伪装检测、声纹识别" ]
[ "游林(1966− ),男,博士,杭州电子科技大学网络空间安全学院教授、硕士生导师,主要研究方向为生物信息处理、信息安全、密码学等" ]
[ "汪云路(1980− ),女,博士,杭州电子科技大学网络空间安全学院讲师,主要研究方向为音频信息处理、信息隐藏" ]
网络出版日期:2021-05,
纸质出版日期:2021-05-20
移动端阅览
徐剑, 简志华, 于佳祺, 等. 采用完整局部二进制模式的伪装语音检测[J]. 电信科学, 2021,37(5):91-99.
Jian XU, Zhihua JIAN, Jiaqi YU, et al. Completed local binary pattern based speech anti-spoofing[J]. Telecommunications science, 2021, 37(5): 91-99.
徐剑, 简志华, 于佳祺, 等. 采用完整局部二进制模式的伪装语音检测[J]. 电信科学, 2021,37(5):91-99. DOI: 10.11959/j.issn.1000-0801.2021108.
Jian XU, Zhihua JIAN, Jiaqi YU, et al. Completed local binary pattern based speech anti-spoofing[J]. Telecommunications science, 2021, 37(5): 91-99. DOI: 10.11959/j.issn.1000-0801.2021108.
针对基于局部二进制模式(LBP)的伪装语音检测算法在检测语音转换的欺骗攻击时效果较差的情况,提出了一种基于完整局部二进制模式(CLBP)的伪装语音检测方法。利用变量Q变换(VQT)生成语音信号的语谱图并应用完整局部二进制模式提取语谱图中的纹理特征向量,再用该纹理特征向量训练真/伪语音分类器,实现伪装语音检测。实验结果表明,所提方法在检测语音转换的欺骗攻击时效果更好,并且当变量Q变换的附加参数γ值为50时,由完整局部二进制模式特征向量训练的基于径向基核函数的支持向量机具有最佳的伪装语音检测性能。
In view of the fact that the disguised speech detection algorithm based on local binary pattern (LBP) is not effective in detecting the spoofing attack from voice conversion
an anti-spoofing method based on completed local binary pattern (CLBP) was proposed.In this method
the spectrogram of speech signals is generated by the variable Q transformation (VQT) and used to train the true/spoofed speech classifier
so as to perform the detection of disguised speech.The experimental results demonstrate that the proposed anti-spoofing method based on the CLBP in the detection of voice conversion deception is better than the LBP-based algorithm
and when the parameter γ in VQT is set to 50
the detection system based on CLBP and SVM-RBF has the best performance for anti-spoofing the disguise speech.
吴震东 , 潘树诚 , 章坚武 . 基于CNN的连续语音说话人声纹识别 [J ] . 电信科学 , 2017 , 33 ( 3 ): 59 - 66 .
WU Z D , PAN S C , ZHANG J W . Continuous speech speaker recognition based on CNN [J ] . Telecommunications Science , 2017 , 33 ( 3 ): 59 - 66 .
WU Z Z , DE LEON P L , DEMIROGLU C , et al . Anti-spoofing for text-independent speaker verification: an initial database,comparison of countermeasures,and human performance [J ] . IEEE/ACM Transactions on Audio,Speech and Language Processing , 2016 , 24 ( 4 ): 768 - 783 .
PHAPATANABURI K , WANG L B , NAKAGAWA S , et al . Replay attack detection using linear prediction analysis-based relative phase features [J ] . IEEE Access , 2019 ( 7 ): 183614 - 183625 .
林朗 , 王让定 , 严迪群 , 等 . 基于逆梅尔对数频谱系数的回放语音检测算法 [J ] . 电信科学 , 2018 , 34 ( 5 ): 90 - 98 .
LIN L , WANG R D , YAN D Q , et al . A playback speech detec-tion algorithm based on log inverse Mel-frequency spectral coefficient [J ] . Telecommunications Science , 2018 , 34 ( 5 ): 90 - 98 .
KHODABAKHSH A , MOHAMMADI A , DEMIROGLU C . Spoofing voice verification systems with statistical speech synthesis using limited adaptation data [J ] . Computer Speech &Language , 2017 ( 42 ): 20 - 37 .
WU Z Z , EVANS N , KINNUNEN T , et al . Spoofing and countermeasures for speaker verification: a survey [J ] . Speech Communication , 2015 ( 66 ): 130 - 153 .
PAUL D , PAL M , SAHA G . Spectral features for synthetic speech detection [J ] . IEEE Journal of Selected Topics in Signal Processing , 2017 , 11 ( 4 ): 605 - 617 .
MUCKENHIRN H , KORSHUNOV P , MAGIMAI-DOSS M , et al . Long-term spectral statistics for voice presentation attack detection [J ] . IEEE/ACM Transactions on Audio,Speech and Language Processing , 2017 , 25 ( 11 ): 2098 - 2111 .
MOWLAEE P , SAEIDI R , STYLIANOU Y . Advances in phase-aware signal processing in speech communication [J ] . Speech Communication , 2016 ( 81 ): 1 - 29 .
WANG L B , NAKAGAWA S , ZHANG Z F , et al . Spoofing speech detection using modified relative phase information [J ] . IEEE Journal of Selected Topics in Signal Processing , 2017 , 11 ( 4 ): 660 - 670 .
HANILCI C , . Speaker verification anti-spoofing using linear prediction residual phase features [C ] // Proceedings of 2017 25th European Signal Processing Conference (EUSIPCO) .[S.l.:s.n. ] , 2017 .
OJALA T , PIETIKAINEN M , MAENPAA T . Multiresolution gray-scale and rotation invariant texture classification with local binary patterns [J ] . IEEE Transactions on Pattern Analysis and Machine Intelligence , 2002 , 24 ( 7 ): 971 - 987 .
AHONEN T , HADID A , PIETIKAINEN M . Face description with local binary patterns: application to face recognition [J ] . IEEE Transactions on Pattern Analysis and Machine Intelligence , 2006 , 28 ( 12 ): 2037 - 2041 .
ALEGRE F , VIPPERLA R , AMEHRAYE A , et al . A new speaker verification spoofing countermeasure based on Local Binary Patterns [C ] // Proceedings of 14th Annual Conference of the International Speech Communication Association (INTERSPEECH) . Piscataway:IEEE Press , 2013 .
GUO Z H , ZHANG L , ZHANG D . A completed modeling of local binary pattern operator for texture classification [J ] . IEEE Transactions on Image Processing , 2010 , 19 ( 6 ): 1657 - 1663 .
CHANG C C , LIN C J . Libsvm [J ] . ACM Transactions on Intelligent Systems and Technology , 2011 , 2 ( 3 ): 1 - 27 .
WU Z Z , YAMAGISHI J , KINNUNEN T , et al . ASVspoof: the automatic speaker verification spoofing and countermeasures challenge [J ] . IEEE Journal of Selected Topics in Signal Processing , 2017 , 11 ( 4 ): 588 - 604 .
徐剑 . 基于 CLBP 和 HOG 的伪装语音检测方法 [D ] . 杭州:杭州电子科技大学 , 2020 .
XU J . A method for detection of spoofing speech based on CLBP and HOG [D ] . Hangzhou:Hangzhou Dianzi University , 2020 .
0
浏览量
185
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构