CN113612738A - Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment - Google Patents
Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment Download PDFInfo
- Publication number
- CN113612738A CN113612738A CN202110821062.9A CN202110821062A CN113612738A CN 113612738 A CN113612738 A CN 113612738A CN 202110821062 A CN202110821062 A CN 202110821062A CN 113612738 A CN113612738 A CN 113612738A
- Authority
- CN
- China
- Prior art keywords
- audio
- voiceprint
- information
- real
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 230000008569 process Effects 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 28
- 230000003111 delayed effect Effects 0.000 claims description 4
- 230000003993 interaction Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002194 synthesizing effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention is suitable for the voiceprint authentication field, and provides a voiceprint real-time authentication encryption method, a computer readable storage medium, voiceprint authentication equipment and controlled equipment, which comprise: receiving audio input by a user; analyzing the audio locally or sending the audio to a server for analysis, authenticating the voiceprint information after the audio is analyzed and authorized voiceprint information to judge whether the audio is a legal voiceprint, or receiving an authentication result which is sent by the server and authenticates the analyzed voiceprint information in the server to judge whether the audio is a legal voiceprint; if the audio frequency is a legal voiceprint, carrying out dislocation phase weighting processing on the voiceprint information analyzed by the audio frequency and the audio frequency to obtain encrypted audio information; and sending the encrypted audio information to the controlled equipment so that the controlled equipment processes the audio information and then executes instruction operation. The invention improves the confidentiality of man-machine interaction.
Description
Technical Field
The invention belongs to the field of voiceprint authentication, and particularly relates to a voiceprint real-time authentication encryption method, a computer readable storage medium, voiceprint authentication equipment and controlled equipment.
Background
In the sound technology commonly applied in the industry at present, different people all say the same words are received and executed by the equipment. The use of this voice technology does not provide the present voiceprint authentication technology. For example, in the current market products, "love, love", "degree, degree", everyone can be received by the device by speaking the key word. Such voice recognition techniques are not unique, and a human can control and operate the device as long as the device is known to receive the key sentences.
After the existing voiceprint authentication technology passes through once, all subsequent instruction operations are not monitored any more even if the instruction operations are illegal. And the use of the one-time authentication technology is easy to be embezzled by lawless persons to make false by legal voice information of other persons, and the confidentiality of man-machine interaction is poor.
Disclosure of Invention
The invention aims to provide a method for real-time voiceprint authentication and encryption, a computer readable storage medium, voiceprint authentication equipment and controlled equipment, and aims to solve the problems that voiceprint identification is not unique and the voiceprint authentication confidentiality is poor.
In a first aspect, the present invention provides a method for real-time authentication and encryption of voiceprint, including:
receiving audio input by a user;
analyzing the audio locally or sending the audio to a server for analysis, authenticating the voiceprint information after the audio is analyzed and authorized voiceprint information to judge whether the audio is a legal voiceprint, or receiving an authentication result which is sent by the server and authenticates the analyzed voiceprint information in the server to judge whether the audio is a legal voiceprint;
if the audio frequency is a legal voiceprint, carrying out dislocation phase weighting processing on the voiceprint information analyzed by the audio frequency and the audio frequency to obtain encrypted audio information;
and sending the encrypted audio information to the controlled equipment so that the controlled equipment processes the audio information and then executes instruction operation.
Further, if the audio is not a legal voiceprint, the audio is not processed and the step of receiving the audio input by the user is returned.
Further, the method also includes sending the encrypted audio information to a server.
Furthermore, the staggered phase weighting process is to extract a plurality of sine wave signals from the voiceprint information after the audio analysis to synthesize a voiceprint file, and synthesize a sound data stream with the audio after delaying for a predetermined time.
Further, the performing of the instruction operation after the controlled device processes the audio information is specifically that the controlled device parses the received audio information in a sound data stream to extract the plurality of sine wave signals delayed for a predetermined time, separates out the voiceprint information and the audio after the audio parsing, and performs the instruction operation according to the audio.
In a second aspect, the present invention provides a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of the method for real-time authenticated encryption of voiceprints according to the first aspect.
In a third aspect, the present invention provides a voiceprint authentication device, including: one or more processors, a memory, and one or more computer programs, the processors and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, which when executing the computer programs implement the steps of the method of voiceprint real time authenticated encryption as described in the first aspect.
In a fourth aspect, the present invention provides a method for voiceprint real-time authentication and encryption, including:
receiving encrypted audio information sent by voiceprint authentication equipment by adopting the voiceprint real-time authentication encryption method in the first aspect;
analyzing and extracting the received audio information in a sound data stream, separating the voiceprint information and the audio after the audio is analyzed, and executing instruction operation according to the audio.
In a fifth aspect, the present invention provides a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of the method for real-time authenticated encryption of voiceprints according to the fourth aspect.
In a sixth aspect, the present invention provides a controlled device, comprising: one or more processors, a memory, and one or more computer programs, the processors and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, which when executing the computer programs implement the steps of the method of voiceprint real-time authenticated encryption as described in the fourth aspect.
In the invention, the audio input by a user is compared with authorized voiceprint information after being analyzed and authenticated, whether the audio is a legal voiceprint is judged, then the voiceprint information after being analyzed and the audio which are determined to be the legal voiceprint are sent to controlled equipment after being subjected to dislocation phase weighting processing, and the controlled equipment executes an instruction; that is, each sent instruction is authenticated and proved to be legal; abnormal files are transmitted between the voiceprint authentication device and the controlled device if the files are intercepted by a malicious device, so that the confidentiality of man-machine interaction is improved.
Drawings
Fig. 1 is a flowchart of a method for real-time authentication and encryption of voiceprint according to an embodiment of the present invention.
Fig. 2 is a block diagram of a specific structure of a voiceprint authentication device according to an embodiment of the present invention.
Fig. 3 is a flowchart of a method for real-time authentication and encryption of voiceprint according to another embodiment of the present invention.
Fig. 4 is a block diagram of a specific structure of a controlled device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clearly apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Referring to fig. 1, a method for real-time authentication and encryption of voiceprint according to an embodiment of the present invention includes the following steps: it should be noted that the method for real-time authentication and encryption of voiceprint according to the present invention is not limited to the flow sequence shown in fig. 1 if the result is substantially the same.
S011, receiving audio input by a user;
s012, analyzing the audio locally, or sending the audio to a server for analysis, authenticating the voiceprint information after the audio is analyzed and authorized voiceprint information to judge whether the audio is a legal voiceprint, or receiving an authentication result which is sent by the server and authenticates the analyzed voiceprint information in the server to judge whether the audio is a legal voiceprint;
s013, if the audio is a legal voiceprint, carrying out dislocation phase weighting processing on the voiceprint information after the audio is analyzed and the audio to obtain encrypted audio information;
and S014, sending the encrypted audio information to the controlled equipment so that the controlled equipment processes the audio information and then executes instruction operation.
In an embodiment of the present invention, if the audio is not a valid voiceprint, the step of receiving the audio input by the user is not performed.
In an embodiment of the present invention, when the analysis operation of the local device is not sufficient, the method further includes sending the encrypted audio information to a server, and performing analysis operation processing by the server.
In an embodiment of the present invention, the staggered phase weighting processing is to extract a plurality of sine wave signals from the voiceprint information after the audio analysis to synthesize a voiceprint file, and synthesize a sound data stream with the audio after delaying for a predetermined time.
In an embodiment of the present invention, the performing the instruction operation after the controlled device processes the audio information is specifically that the controlled device parses the received audio information in a sound data stream to extract the plurality of sine wave signals delayed by the predetermined time, separates out the voiceprint information and the audio after the audio parsing, and performs the instruction operation according to the audio.
For example: and selecting the third to eighth sine wave signals extracted from the voiceprint information after audio analysis to synthesize a voiceprint file, and synthesizing the voiceprint file with the audio after delaying for 100ms (of course, delaying for other time lengths, such as between 80ms and 120 ms). Therefore, the device is suitable for normal operation of equipment and does not influence use; and after the appointed mechanism is determined, the controlled equipment extracts the execution instruction according to the mechanism.
The controlled device analyzes and extracts the received audio information in the sound data stream, extracts the third to eighth sine wave signals delayed by 100ms, separates the voiceprint information and the audio after audio analysis, and executes instruction operation according to the audio.
An embodiment of the present invention provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the method for real-time authentication and encryption of voiceprints according to an embodiment of the present invention.
Fig. 2 is a block diagram showing a specific structure of a voiceprint authentication device according to an embodiment of the present invention, where a router 100 includes: one or more processors 101, a memory 102, and one or more computer programs, wherein the processors 101 and the memory 102 are connected by a bus, the one or more computer programs are stored in the memory 102 and configured to be executed by the one or more processors 101, and the steps of the method for voiceprint real-time authenticated encryption according to an embodiment of the invention are implemented when the computer programs are executed by the processors 101.
In an embodiment of the present invention, the voiceprint authentication device may be a headset.
Referring to fig. 3, another embodiment of the present invention provides a method for real-time authentication and encryption of voiceprint, including:
s021, receiving encrypted audio information sent by voiceprint authentication equipment by using the voiceprint real-time authentication encryption method in the embodiment of the invention;
s022, analyzing and extracting the received audio information in a sound data stream, separating voiceprint information and the audio after audio analysis, and executing instruction operation according to the audio.
An embodiment of the present invention provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the method for real-time authentication and encryption of voiceprints according to another embodiment of the present invention.
Fig. 4 shows that an embodiment of the present invention provides a controlled device 200, including: one or more processors 201, a memory 202, and one or more computer programs, wherein the processors 201 and the memory 202 are connected by a bus, the one or more computer programs are stored in the memory 202 and configured to be executed by the one or more processors 201, and the steps of the method for real-time authenticated encryption of voiceprints according to another embodiment of the present invention are implemented when the computer programs are executed by the processors 201.
In an embodiment of the present invention, the controlled device is built in a unit of the authentication device or various wireless electronic devices and intelligent wireless devices.
In the embodiment of the invention, the audio input by a user is compared with authorized voiceprint information after being analyzed and authenticated, whether the audio is a legal voiceprint is judged, then the voiceprint information after being analyzed and the audio which are determined to be the legal voiceprint are sent to controlled equipment after being subjected to dislocation phase weighting processing, and the controlled equipment executes an instruction; that is, each sent instruction is authenticated and proved to be legal; abnormal files are transmitted between the voiceprint authentication device and the controlled device if the files are intercepted by a malicious device, so that the confidentiality of man-machine interaction is improved.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
Claims (10)
1. A method for voiceprint real-time authentication encryption is characterized by comprising the following steps:
receiving audio input by a user;
analyzing the audio locally or sending the audio to a server for analysis, authenticating the voiceprint information after the audio is analyzed and authorized voiceprint information to judge whether the audio is a legal voiceprint, or receiving an authentication result which is sent by the server and authenticates the analyzed voiceprint information in the server to judge whether the audio is a legal voiceprint;
if the audio frequency is a legal voiceprint, carrying out dislocation phase weighting processing on the voiceprint information analyzed by the audio frequency and the audio frequency to obtain encrypted audio information;
and sending the encrypted audio information to the controlled equipment so that the controlled equipment processes the audio information and then executes instruction operation.
2. The method of claim 1, wherein if the audio is not a legitimate voiceprint, then not processing the audio and returning to the step of receiving audio input by a user.
3. The method of claim 1, further comprising sending the encrypted audio information to a server.
4. The method of claim 1, wherein the staggered phase weighting process is to extract a plurality of sine wave signals from the audio parsed voiceprint information to synthesize a voiceprint file, and to synthesize a sound data stream with the audio after a predetermined delay.
5. The method as claimed in claim 1, wherein the performing of the command operation after the audio information is processed by the controlled device is specifically that the controlled device parses the received audio information in a sound data stream to extract the plurality of sine wave signals delayed for the predetermined time, separates the audio parsed voiceprint information and the audio, and performs the command operation according to the audio.
6. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method for real-time authenticated encryption of voiceprints according to any one of claims 1 to 5.
7. A voiceprint authentication device comprising: one or more processors, a memory and one or more computer programs, the processors and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, characterized in that the steps of the method of voiceprint real-time authenticated encryption according to any one of claims 1 to 5 are implemented when the computer programs are executed by the processors.
8. A method for voiceprint real-time authentication encryption is characterized by comprising the following steps:
receiving encrypted audio information sent by a voiceprint authentication device by adopting the voiceprint real-time authentication encryption method of any one of claims 1 to 5;
analyzing and extracting the received audio information in a sound data stream, separating the voiceprint information and the audio after the audio is analyzed, and executing instruction operation according to the audio.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method for real-time authenticated encryption of voiceprints according to claim 8.
10. A controlled device, comprising: one or more processors, a memory, and one or more computer programs, the processors and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, characterized in that the steps of the method of voiceprint real-time authenticated encryption according to claim 8 are implemented when the computer programs are executed by the processors.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110821062.9A CN113612738B (en) | 2021-07-20 | 2021-07-20 | Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110821062.9A CN113612738B (en) | 2021-07-20 | 2021-07-20 | Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN113612738A true CN113612738A (en) | 2021-11-05 |
| CN113612738B CN113612738B (en) | 2023-05-16 |
Family
ID=78304882
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202110821062.9A Active CN113612738B (en) | 2021-07-20 | 2021-07-20 | Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN113612738B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN117354797A (en) * | 2023-12-04 | 2024-01-05 | 深圳市华粤世通软件科技有限公司 | A mobile communication system and terminal based on information encryption |
Citations (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1547191A (en) * | 2003-12-12 | 2004-11-17 | 北京大学 | Speaker Identification System Combining Semantic and Voiceprint Information |
| US20060287863A1 (en) * | 2005-06-16 | 2006-12-21 | International Business Machines Corporation | Speaker identification and voice verification for voice applications |
| CN102073829A (en) * | 2011-01-10 | 2011-05-25 | 杭州电子科技大学 | Document encrypting method and document decrypting method on basis of voice print |
| CN103093761A (en) * | 2011-11-01 | 2013-05-08 | 腾讯科技(深圳)有限公司 | Audio fingerprint retrieval method and retrieval device |
| CN103824353A (en) * | 2012-11-19 | 2014-05-28 | 五甲(大连)计算机系统研发有限公司 | Door key system using cell phone as voiceprint encrypted recognition terminal |
| CN105390143A (en) * | 2015-08-27 | 2016-03-09 | 中国航空工业集团公司西安飞行自动控制研究所 | Voiceprint recognition-based intelligent program control method |
| CN109887509A (en) * | 2019-01-25 | 2019-06-14 | 广州富港万嘉智能科技有限公司 | A kind of control method of ordering, electronic equipment and storage medium based on vocal print |
| CN110084014A (en) * | 2019-03-21 | 2019-08-02 | 深圳壹账通智能科技有限公司 | Data inputting method, device, computer equipment and storage medium |
| CN110574103A (en) * | 2018-06-29 | 2019-12-13 | 华为技术有限公司 | A voice control method, wearable device and terminal |
| CN110677260A (en) * | 2019-09-29 | 2020-01-10 | 京东方科技集团股份有限公司 | An authentication method, device, electronic device and storage medium |
| CA3129358A1 (en) * | 2019-02-22 | 2020-08-27 | Banks And Acquirers International Holding | Method for managing the access of a user to a voice service, corresponding device, system and programs |
| CN111785285A (en) * | 2020-05-22 | 2020-10-16 | 南京邮电大学 | Voiceprint recognition method for home multi-feature parameter fusion |
-
2021
- 2021-07-20 CN CN202110821062.9A patent/CN113612738B/en active Active
Patent Citations (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1547191A (en) * | 2003-12-12 | 2004-11-17 | 北京大学 | Speaker Identification System Combining Semantic and Voiceprint Information |
| US20060287863A1 (en) * | 2005-06-16 | 2006-12-21 | International Business Machines Corporation | Speaker identification and voice verification for voice applications |
| CN102073829A (en) * | 2011-01-10 | 2011-05-25 | 杭州电子科技大学 | Document encrypting method and document decrypting method on basis of voice print |
| CN103093761A (en) * | 2011-11-01 | 2013-05-08 | 腾讯科技(深圳)有限公司 | Audio fingerprint retrieval method and retrieval device |
| CN103824353A (en) * | 2012-11-19 | 2014-05-28 | 五甲(大连)计算机系统研发有限公司 | Door key system using cell phone as voiceprint encrypted recognition terminal |
| CN105390143A (en) * | 2015-08-27 | 2016-03-09 | 中国航空工业集团公司西安飞行自动控制研究所 | Voiceprint recognition-based intelligent program control method |
| CN110574103A (en) * | 2018-06-29 | 2019-12-13 | 华为技术有限公司 | A voice control method, wearable device and terminal |
| CN109887509A (en) * | 2019-01-25 | 2019-06-14 | 广州富港万嘉智能科技有限公司 | A kind of control method of ordering, electronic equipment and storage medium based on vocal print |
| CA3129358A1 (en) * | 2019-02-22 | 2020-08-27 | Banks And Acquirers International Holding | Method for managing the access of a user to a voice service, corresponding device, system and programs |
| CN110084014A (en) * | 2019-03-21 | 2019-08-02 | 深圳壹账通智能科技有限公司 | Data inputting method, device, computer equipment and storage medium |
| CN110677260A (en) * | 2019-09-29 | 2020-01-10 | 京东方科技集团股份有限公司 | An authentication method, device, electronic device and storage medium |
| CN111785285A (en) * | 2020-05-22 | 2020-10-16 | 南京邮电大学 | Voiceprint recognition method for home multi-feature parameter fusion |
Non-Patent Citations (2)
| Title |
|---|
| ZHANGTING YU、DAJIAN LI、LIANGYUAN CHEN、HAIJUN YAN: ""The research on transformer fault diagnosis method based on vibration and noise voiceprint imaging technology"", 《2019 14TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA)》 * |
| 张重远、罗世豪、岳浩天、王博闻、刘云鹏: ""基于Mel时频谱-卷积神经网络的变压器铁芯声纹模式识别方法"", 《高电压技术》 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN117354797A (en) * | 2023-12-04 | 2024-01-05 | 深圳市华粤世通软件科技有限公司 | A mobile communication system and terminal based on information encryption |
Also Published As
| Publication number | Publication date |
|---|---|
| CN113612738B (en) | 2023-05-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20190013026A1 (en) | System and method for efficient liveness detection | |
| US11038907B2 (en) | System and method for malware detection learning | |
| CN109450850B (en) | Identity authentication method, identity authentication device, computer equipment and storage medium | |
| CN106778179B (en) | An identity authentication method based on ultrasonic lip recognition | |
| CN105933272A (en) | Voiceprint recognition method capable of preventing recording attack, server, terminal, and system | |
| JP2016511475A (en) | Method and system for distinguishing humans from machines | |
| CN105702263A (en) | Voice playback detection method and device | |
| CN108319829B (en) | Voiceprint verification method and device | |
| US20220358934A1 (en) | Spoofing detection apparatus, spoofing detection method, and computer-readable storage medium | |
| CN102377729A (en) | User registration and logon method by combining speaker speech identity authentication and account code protection in network games | |
| CN113612738B (en) | Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment | |
| WO2023172936A1 (en) | Systems and apparatus for multifactor authentication using bone conduction and audio signals | |
| Alegre et al. | Evasion and obfuscation in automatic speaker verification | |
| Mubeen et al. | Detection of impostor and tampered segments in audio by using an intelligent system | |
| EP4047496B1 (en) | Processing input data | |
| CN118841023B (en) | Audio optimization method, system and equipment based on artificial intelligence | |
| CN115314268A (en) | Malicious encrypted traffic detection method and system based on traffic fingerprints and behaviors | |
| Beekhof et al. | Content authentication and identification under informed attacks | |
| CN115346532A (en) | Optimization method, terminal equipment and storage medium of voiceprint recognition system | |
| Wu et al. | HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks | |
| KR20010019772A (en) | User Password Verification System and Method by Speech for Reinforced Security | |
| KR102506123B1 (en) | Deep Learning-based Key Generation Mechanism using Sensing Data collected from IoT Devices | |
| Das et al. | Comparison of DTW score and warping path for text dependent speaker verification system | |
| CN119182533B (en) | Security management method and system based on communication networking | |
| CN120600034A (en) | Sound recognition processing method and device for smart power applications |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |