Next Article in Journal
An Effective YOLO-Based Proactive Blind Spot Warning System for Motorcycles
Previous Article in Journal
MRAM Devices to Design Ternary Addressable Physically Unclonable Functions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Application of Voiceprint Recognition Technology Based on Channel Confrontation Training in the Field of Information Security

1
College of Software, Nankai University, Tianjin 300100, China
2
School of Microelectronics, Tianjin University, Tianjin 300100, China
3
China United Network Communication Group Co., Ltd., Beijing 100000, China
4
Education Foundation of Beijing Central University for Nationalities, Beijing 100000, China
*
Author to whom correspondence should be addressed.
The authors contributed equally to this work.
Electronics 2023, 12(15), 3309; https://doi.org/10.3390/electronics12153309
Submission received: 31 May 2023 / Revised: 27 July 2023 / Accepted: 30 July 2023 / Published: 2 August 2023
(This article belongs to the Section Circuit and Signal Processing)

Abstract

:
With the rapid development of big data, artificial intelligence, and Internet technologies, human–human contact and human–machine interaction have led to an explosion of voice data. Rapidly identifying the speaker’s identity and retrieving and managing their speech data among the massive amount of speech data have become major challenges for intelligent speech applications in the field of information security. This research proposes a vocal recognition technique based on information adversarial training for speaker identity recognition in massive audio and video data, as well as speaker identification when oriented to the information security domain. The experimental results show that the method projects data from different scene channels all onto the same space and dynamically generates interactive speaker representations. It solves the channel mismatch problem and effectively improves the recognition of the speaker’s voice patterns across channels and scenes. It is able to separate overlapping voices when multiple people speak at the same time and reduce speaker separation errors. It realizes speaker voice recognition for the information security field and achieves a recall rate of 89% in a large database, which is of practical value for the intelligent application field.

1. Introduction

With the development of big data, the Internet, and artificial intelligence technologies, human–computer interaction and communication for all have become globalized, and with the increasing frequency of these communications, the speech data generated show an explosive growth trend [1]. In the field of information security and intelligent speech, how to quickly locate the identity of a speaker in massive speech data and how to confirm, retrieve, and manage the speaker’s speech have become major problems in practical applications [2], for example, the management of blacklisted people in intelligent customer service, voice payment in online banking, and the control, identity confirmation, and attendance authentication of people using voice information in the Internet domain [3]. Human-to-human communication and human–computer interaction are the most direct and convenient ways of using voice information, which also encompass a large amount of information. The most common content information is one of them, and the most generalized nowadays is voice information [4]. Voice information includes linguistic information, speaker information, emotional information, and environmental information. Voice recognition, also known as speaker recognition, is based on the speaker identity information contained in the voice and the speech content information [5]. This research deals with text-independent speaker recognition in the field of information security for massive audio and video data, as well as for text-related speaker confirmation scenarios for speaker identity confirmation. The text-independent speaker recognition based on channel adversarial training can effectively solve the scenario of channel mismatch between registered speech and test speech and improve the speech recognition performance. Channel adversarial training is used to extract speaker representations to improve speaker recognition. The attention system is then influenced based on the registered and tested speech to improve the confirmation effect with a dynamic interaction and speaker features. The research is divided into three main parts; the first part is oriented to the overview of the vocal databases in the field of information security, which involves the storage of voice vocal databases and the storage and management of massive speaker data. The composition of the speaker recognition system for information security, the establishment of the speaker voice database, and the framework design of the recognition system. The second part is a text-independent speaker recognition method based on channel adversarial training and the design of the channel adversarial training recognition network structure. The third part is the experimental verification and analysis of the performance of the channel-adversarial-training-based voice recognition technique to demonstrate the effectiveness of the proposed method in this study.

2. Related Works

With the development of artificial intelligence technology, voice has direct and convenient characteristics and therefore becomes the preferred way of communication. Additionally, vocal recognition technology has a non-negligible role in the huge amount of voice data generated. Sun et al. proposed an improved convolutional-neural-network-based vocal recognition method. By introducing an improved pooling method, the activation values are squared after the activation function and squared probabilities are assigned to achieve random pooling. The advantages of random pooling are combined while retaining the feature extraction of the maximum pooling method. The possibility of extracting hidden features is enhanced, and the effectiveness of the method is verified by simulation results using a grayscale digital acoustic spectrometer in a self-built acoustic database for acoustic recognition experiments [6]. Hong Z et al. proposed an end-to-end acoustic recognition algorithm based on a convolutional neural network, which uses convolution and downsampling of the convolutional neural network to preprocess the speech signal in end-to-end acoustic recognition. From the preprocessed signal, feature parameters are extracted, and a background model is used to model the voiceprint recognition model [7]. Bahmaninezhad et al. developed three alternative speaker embedding systems and proposed new variants of support vector discriminant analysis. In order to facilitate the widespread application of speaker recognition in business, law, education, and universal speech interfaces, speaker recognition continues to be a research challenge in this area. Speaker identification is used in domain mismatch problems, particularly natural audio streams, including a mismatch between training and test data. These results confirm that this method can significantly improve speaker recognition performance in the SRE-16 and SRE-18 tasks by +15% and +8%, respectively (gains of +14% and +16% [8]), when using i-vector speaker embedding as the baseline [8].
With the popularity of smartphones and other smart devices, personal speech is stored and transmitted on different hardware and applications, and techniques for cross-channel applications have received increasing attention. Yu et al. proposed a technique for race, age, and gender image transformation by generating adversarial networks. The dataset used for age-estimation studies suffers from age–class imbalance due to the different age distribution of race or gender. This leads to one-sided overfitting of the training data and reduces the generalizability of age estimation. Experiments using four open databases have shown that the method outperforms state-of-the-art methods [9]. Wang et al. proposed a spatial domain and channel domain attention mechanism that addressed the problem of manually designed feature extraction and fusion rules in existing image fusion methods. Experimental results show that the detection model trained by transfer using fused images has the best performance with accuracy P, recall R, average accuracy, and F-1 scores of 0.804, 0.923, 0.928, and 0.859, respectively [10]. Bai and Zhang provided an overview of speaker diaries based on deep-learning speaker feature extraction, highlighting recent supervised diaries and end-to-end diaries and exploring robust speaker recognition from domain adaptation and speech enhancement perspectives to address domain mismatch and noise issues. The experiment concludes with a list of popular and recently published corpora based on speaker validation, recognition, diaries, and robust speaker recognition [11]. Wang et al. proposed a two-channel SS fusion capsule generation adversarial net for HSI classification. To further improve the classification performance, an SS channel fusion model was constructed to synthesize and switch the feature information of different channels, thus improving the accuracy and robustness of the overall classification performance. The experimental performance shows that the proposed model can effectively improve the classification accuracy and performance [12]. Rezgui and Marks explored the factors that influence the information security awareness of higher education staff, including information system decision makers, in developing countries. The study showed that factors, such as responsibility, cultural assumptions and beliefs, and social conditions, usually influence the behavior and work attitudes of university staff, especially information security awareness [13].
To sum up, the intelligence and informatization of life make people communicate with each other more and more frequently, and the voice data generated are immeasurable. In the field of information security and intelligent speech, rapidly locating the identity of the speaker and speaker identification of the channel is a critical issue. This research proposes a vocal recognition technique based on channel adversarial training for such a problem, which has practical implications for intelligent applications in the field of information security.

3. Study of Speaker Recognition Techniques Based on Channel Confrontation Training

Since individual voice is always stored and transmitted on different hardware and applications, it is important to identify speakers across channels. However, in the deep-learning processing method of intelligent speech, the end-to-end speaker representation has good prospects. Therefore, this chapter proposes the identification method of voiceprint recognition technology based on the adaptation of the channel domain.

3.1. A Voice Information Database of the Speaker Recognition System

In real life, the scale of audio data is very large, and the centralized storage method of the server is unable to meet the demand of massive data storage and management [14]. Therefore, a distributed storage scheme is used in the system, which mainly concentrates the disk space on the machines within the network into a virtual storage space, and even though the physical storage is distributed everywhere, it can still be used as a virtual overall space to provide storage services to the outside world [15]. The storage and management of massive audio data are shown in Figure 1.
Figure 1 is a massive voice data resource database, which is mainly composed of telephone voice, Internet voice, and other voice, the three sub-speaker voice databases. In storage facing massive speaker representation, distributed storage is the interface for storing external file upload, file download, file modification, and file deletion [16]. Distributed storage is to create the voiceprint sublibrary according to the gender, age, and other information of the speaker, which is the most concise and effective way to build the voiceprint word library. The purpose of this is to increase the fault-tolerance mechanism in the word library construction process. The machine automatically gives the gender label to the speaker in the library, and when searching the test voice, you can go directly to the corresponding word library after obtaining the information [17]. However, gender-based identification usually requires speaker-related and irrelevant judgment of the category information after clustering. Among them, the most common application mode is the text-independent speaker recognition system and the text-dependent speaker identification system, whose structural flow is shown in Figure 2.
Figure 2 shows the flowchart of multi-method voiceprint recognition under the text-independent speaker recognition and text-dependent speaker verification systems. In practice, there is also often a scene and channel mismatch between the registration and test datasets, which is less effective for speaker recognition [18]. Therefore, for a speech recognition system, a detection cost function (DCF) is given as an evaluation metric using the expression shown in Equation (1).
DCF = C f a F A P Im p + C f r F R P T a r
In Equation (1), F A is the false acceptance rate, F R is the false rejection rate, C f a denotes the false rejection cost, C f r denotes the false reception cost, P Im p denotes the non-target speaker prior probability, and P T a r denotes the target speaker prior probability. The values of these four variables can be adjusted according to different application scenarios. And in order to solve the scenario channel mismatch, the i v e c t o r back-end system is used to compensate the channel. PLDA is a channel compensation algorithm that can decouple the guaranteed information more thoroughly, and its calculation formula is shown in Equation (2).
x i j = μ + F h i + G w i j + ε i j
In Equation (2), x i j denotes the i v e c t o r extracted from the j speech of the i speaker, μ denotes the overall mean of the training data i v e c t o r , F denotes the speaker information space, G denotes the channel space, ε i j denotes the residual term, h i denotes the speaker space coordinates, and w i j denotes the channel space coordinates. PLDA is tested either by extracting h i to calculate the cosine distance score or by directly calculating the likelihood generated from h i , as defined in Equation (3).
s c o r e = log p ( x 1 , x 2 | H S ) p ( x 1 , | H d ) p ( x 2 , | H d )
In Equation (3), x 1 and x 2 denote the i v e c t o r of two voices, H s and H d denote the same speaker and different speakers, p ( x 1 , x 2 | H S ) denotes the x 1 and x 2 likelihood functions of the same speaker, and s c o r e denotes the final score. Deep-learning approaches have become the main technique for speaker recognition, whereas the end-to-end approach has become one of the mainstream approaches in the field of pattern recognition. The advantage of the end-to-end framework is that it can directly have the optimization of the target, and in the speech separation task, the scale-invariant source-to-noise ratio (SI-SNR) is used as the metric, which is calculated as shown in Equation (4).
SI - SNR = 10 log 10 S t arg e t 2 S S t arg e t 2
In Equation (4), S t arg e t = < S , S > S S 2 , S , and S are the estimated and target values, respectively. For multiple outputs, the overall loss function is usually based on the displacement-invariant training learning target, which is calculated as shown in Equation (5).
L = 1 N i = 1 N l ( S i S ϕ )
In Equation (5), N denotes the number of speakers, l denotes the error between the network output and the target, S i denotes the first i predicted voice, and S ϕ denotes the reference voice with the alignment order ϕ that minimizes the training target L . The end-to-end speaker characterization using deep neural networks to compensate for channel mismatch is even more widely used.

3.2. Voice Recognition Based on Channel Adversarial Training

As deep learning becomes a major technique in the field of intelligent speech and is popularly used in speaker recognition, end-to-end speaker-based characterization has a good prospect [19]. However, for the training data collected from different channels, the convolutional neural network cannot directly model the speaker information between different channels. In this study, based on an unsupervised domain adaptive approach, we propose a model by channel adversarial training (CAT), which relies only on the speaker’s speech data under each channel and does not require the same speaker’s speech data under different channels. The model structure is shown in Figure 3.
Figure 3 shows the structure of the speaker recognition network based on channel adversarial training with a baseline CNN model. Five convolutional layers are included, and the input layers piece together the features of the same person to form a feature map. The overall loss function of the model consists of Softmax and Triplet loss functions together. Its calculation formula is shown in Equation (6).
L s = i = 1 M log e W y i T x i + b y i j = 1 N e W j T x i + b j
In Equation (6), x i is represented as the representation of the i speaker, which belongs to the speaker y i . w j denotes the last fully connected column j , and b is the bias term. The size of the minibatch is M , and the number of speakers is N . The Triplet loss function is defined as shown in Equation (7).
L T = i = 1 M max ( 0 , D ( x i , x n ) + δ D ( x i , x p ) )
In Equation (7), the two samples in ( x i , x p ) are from the same speaker, while ( x i , x n ) is from a different speaker and x i is the anchor sample of the triad. D ( x i , x p ) denotes the cosine distance between the two input vectors, and the two loss functions are superimposed and adjusted by the weights α , which are calculated as shown in Equation (8).
L = L s + α L T
In the face of excessively long sentences, the long sentences are segmented into multiple short segment using sliding windows that do not overlap each other. And then the sentence-level speaker representation vector is obtained by average pooling. The model is decomposed into three different neural networks, including a feature extractor G , a speaker label classifier D 1 , and a channel label classifier D 2 , and the expressions are shown in Equation (9).
{ G = f G ( x , θ G ) D 1 = f D 1 ( g , θ D 1 ) D 2 = f D 2 ( g , θ D 2 )
In Equation (9), θ G , θ D 1 , and θ D 2 represent the parameters of each network using a gradient inversion layer and optimizing θ G to minimize the speaker prediction loss and maximize the channel classification loss. The hyperparameter β is used to balance the D 1 and D 2 losses in the backpropagation process to obtain representation of channel invariance and speaker differentiation. The overall optimized loss function is a combination of the D 1 and D 2 loss functions. The loss function is defined as shown in Equation (10).
L D 1 = L s + α L T
In Equation (10), the overall loss function consists of Softmax and Triplet loss functions together and is adjusted by the weights α . D 2 is the loss function, which is defined as shown in Equation (11).
L D 2 = i = 1 M log e W d i T x i + b d i j = 1 K e W j T x i + b j
In Equation (11), denotes the representation of the x i   i th speaker, which belongs to the speaker d i . w j denotes the last fully connected column of j , and b is the bias term. The size of the minibatch is M , and the number of speakers is N . The whole CAT framework is optimized using the stochastic gradient descent method. The optimal parameters are obtained from the optimization process of the following equation as shown in Equation (12).
{ θ G = θ G l ( L D 1 θ G β L D 2 θ G ) θ D 1 = θ D 1 l ( L D 1 θ D 1 ) θ D 2 = θ D 2 l ( L D 2 θ D 2 )
In Equation (12), speaker representations with channel invariance, as well as speaker differentiation, are extracted directly from the network after training with the above parameters. This method can map two different channels within a common subspace, train channel invariant processes, and obtain speaker representations of speaker discriminability. This eliminates channel differences and improves speaker recognition performance. This framework mitigates channel mismatch through channel antagonism training, overcomes channel divergence, and improves applicability in real scenarios. Since most of the massive voice data comes from telephony, Internet audio and video, and other APP applications, the schematic diagram of the speaker recognition system in the field of information security is shown in Figure 4.
Figure 4 shows the speaker identification system in the information security field. The system faces the massive voice data from telephone, Internet audio and video, and various application software and enters the intelligent speaker analysis application system through the data access module. After the system input voice data processing, the voice speaker database is established. Therefore, before speaker representation extraction, speech preprocessing filtering, such as speech activity detection, speaker separation, and false detection, so as to realize text-independent voiceprint recognition and text-dependent voiceprint recognition. After preprocessing the data in the system, the speech data are extracted and indexed by the speaker, and other unprocessed data, such as fake sounds, are discarded. Based on this, the system is divided into two parts. One is to build the text-dependent speaker confirmation system for community correction and other user collaboration scenarios. The other is to target scenarios, such as public safety, to build text-independent speaker systems, where the resulting separation error rate refers to the percentage of the length of the total effective speech length and is defined as in Equation (13).
DER = FALSE + MISS + SER
In Equation (13), FALSE denotes the false alarm rate of valid speech detection, MISS denotes the miss detection rate of valid speech detection, and SER denotes the speaker-to-speaker classification error rate. In the false voice detection task, an acoustic feature CQCC based on constant-Q transform (CQT) combined with cepstral generation is commonly used. It first performs the CQT transform on the speech signal as shown in Equation (14).
X C Q ( k , n ) = j = n | N k / 2 | j = n + | N k / 2 | x ( j ) a k ( j n + N k / 2 )
The system extracts the speaker representation for each speech data, extracts the speaker information, and stores and retrieves it. The control layer includes the functions of task scheduling, data management, and plug-in management, and the plug-in is the process shown in Figure 5.
Add-in management is the use of speech detection, false tone detection, speaker separation, and text-based speaker recognition as an independent plug-in to quickly synthesize application market requirements for the module [20]. When applied to the user cooperation scenario, it is mainly required for the speech detection, false tone detection, and text-dependent speaker confirmation function module to realize the output of structured speaker information. When applied to the non-perception monitoring scene, the speaker separation module is added, which needs to adapt the text-dependent speaker recognition to the text-independent speaker identification module, and finally output the structured speaker information. Through plug-in management, not only can rapid configuration be realized after application scenario selection, but also rapid switching of multiple application scenarios can be realized in one system.

4. The Application of Speaker Technology Based on Channel Confrontation Training in the Field of Information Security

This chapter collects audio from several real-life scenarios, including conversations of phone calls, meetings, multi-person chats, and other types. While current speech separation techniques perform better in the case of two people speaking, they are less effective in the case of multiple people speaking. This research addresses the enhancement of the speech separation technique in the case of multiple speakers. By simulating the richness of speech in real conversation scenarios, data with different speech overlap rates are added, and the data are shown in Figure 6.
As can be seen from Figure 6, the four different groups of speech overlap rates present different speech styles, and speech separation is a good separation scheme for the task of separating speech overlap segments. Additive sparse mixing of speech with different overlap rates is performed, which is useful for the study to improve the generalization of different speakers. It is obvious from the different speech overlap rates that increasing the size of the training data gradually improves the overall performance. Adding them to the model training further improves the DER from 12.91% to 12.78%. However, if the channel adversarial training strategy is not used, its experimental results are changed in this study. The comparison of the results by removing the D2 module from the CAT framework in this study is shown in Table 1.
As can be seen from Table 1, the removal of the D2 module in the CAT framework, which is the channel classifier, enables the model complexity to be compared with no channel adversarial training strategy under this approach. The EER results of the CAT method are compared with those of the I-vector, CNN, and CAT with the D2 module removed, and the EER results of the I-vector method are around 8.5%, the EER results of the CNN and CAT without D2 methods are around 6.2%, and the EER results of the CAT method are around 5.8%. After conducting a comparison of the four sets of results, it is clear that simply increasing the feature extractor G does not improve the performance. This shows the effectiveness of the adversarial strategy proposed in this study. To further validate the performance of the speaker recognition task on large-scale data, the performance metric of the test set is TopN recall, and the CAT method is compared with the I-vector, CNN, and CAT method, with the D2 module removed for TopN recall results, which are shown in Table 2.
As can be seen from Table 2, the speaker recognition performance achieved a relative 22.3% (6.5% in absolute value) improvement in Top1 recall compared to the baseline after the CAT method. In particular, regarding the TopN recall on the test set for the CAT method compared with the I-vector, CNN, and CAT with the D2 module removed, the recall under the I-vector method improved by 27%. The recall under both the CNN and CAT without D2 methods improved by about 10%, and the recall under the CAT method improved over the other methods by 6.5%. This shows that the test set and the development set are consistent in terms of data performance, further demonstrating the effectiveness of the CAT method. In order to balance the two loss functions under the CAT framework, the variation of EER and Top1 metrics with the parameter β was investigated using the hyperparameter β , and the results are shown in Figure 7.
As can be seen from Figure 7, when the hyperparameter β is set to 0, the EER indicator is 5.8, which presents the lowest value, and when the hyperparameter β is 1.68, the EER indicator is 6.23, which is the highest value. However, when the hyperparameter β is set to 0, the Top1 indicator is 76.69, which presents the highest value, and when the hyperparameter is 2.48, the Top1 indicator is 71.73, which is the lowest value. It can be seen that the lowest EER indicator and the highest Top1 indicator both appear when the hyperparameter β is set to 0. In addition, two different loss function weights of the hyperparameters β and γ were used to test the performance of the model, and the effects of the two hyperparameters on the EER are shown in Figure 8.
As can be seen from Figure 8, when γ is initialized to 1, the effect of β on the EER of the development set shows a decreasing trend, and when β is set to −1, the EER indicator has the highest value of 8.76, and when β is set to 0, the EER indicator has the lowest value of 6.71. When β is initialized to 1, the effect of γ on the EER of the development set shows a decreasing trend, and when γ is set to 1, the EER indicator has the highest value of 7.48, and when γ is set to 0.7, the EER indicator has the lowest value of 6.31. When γ is set to 0.7, the EER indicator is the lowest value of 6.31. Thus, it can be seen that when β is set to 0 and is set to 5, the EER indicator reaches the lowest EER indicator of 6.12 in the channel adversarial training method. In addition, the bidirectional attention mechanism designed for end-to-end text-irrelevant speaker recognition is used, taking into account the text-irrelevant speaker recognition task and the selective auditory attention of the human brain. The data of attention weights corresponding to the registered speech and the test speech are analyzed under the CNN model and the BaCNN model. The results of their analysis are shown in Figure 9.
From Figure 9, where SpkA_utt2 and SpkA_utt3 are speech 2 and speech 3 of the exploring speaker, respectively, and SpkA_utt4 is speech 4 of the speaker for the distribution of attention weights when testing the speech. The horizontal coordinate is the frame index, and the vertical coordinate is the attention weight coefficient. The attention weight of SpkA_utt2 in the CNN model is highly similar to the corresponding SpkA_utt3, which can be large when the test speech is from a different speaker. The attention weight of SpkA_utt2 in the BaCNN model is 35 frames ahead of SpkA_utt4. The attention weights of the registered speech differ depending on the test speaker, which indicates that the representation of interactive speech from different speakers is indeed learned in the BaCNN model.

5. Conclusions

Speaker voice recognition technology has a very important application value in the field of information security. With the recognition needs of telephone, Internet, and various APP applications, for the speaker voice recognition technology for the information security field. This research proposes a vocal recognition technology based on channel confrontation training for the task of text-independent speaker recognition and text-related speaker confirmation for massive audio and video in the field of information security. Additive sparse mixing of speech with different overlap rates is performed. It is evident from the different speech overlap rates that increasing the size of the training data gradually improves the overall performance. Adding them to the model training further increases the DER from 12.91% to 12.78%. The lowest EER metric and the highest Top1 metric both occur when the hyperparameter is set to 0. The recall rates under both CNN and CAT without D2 methods improved by about 10%, and the recall rates under the CAT method both improved by 6.5% over the other methods. In addition, the bidirectional attention mechanism was designed by considering the text-independent speaker recognition task and thinking about the selective auditory attention of the human brain. The attention weights of SpkA_utt2 in the CNN model are highly similar to the corresponding SpkA_utt3. SpkA_utt2 in the BaCNN model is 35 frames ahead of SpkA_utt4 in the BaCNN model, which does learn the representations of the interactive speech of different speakers. In conclusion, the vocal recognition technique based on channel adversarial training obtains the speaker’s representations, improves the channel mismatch problem, and enhances the vocal recognition effect.

Author Contributions

Conceptualization, S.G.; Methodology, S.G.; Software, H.W.; Formal analysis, C.Z.; Investigation, H.W. and T.G.; Data curation, H.W.; Writing—original draft, S.G. and C.Z.; Writing—review & editing, T.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by The National Key Research and Development Program of China (NO. 2020YFC0833400).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Feng, Y. Make the rocket intelligent at IOT edge: Stepwise GAN for anomaly detection of LRE with multi-source Fusion. IEEE Internet Things J. 2021, 9, 35–49. [Google Scholar] [CrossRef]
  2. Li, Q.; Qu, H.; Liu, Z.; Zhou, N.; Sun, W.; Sigg, S.; Li, J. AF-DCGAN: Amplitude feature deep convolutional GAN for fingerprint construction in indoor localization systems. Netw. Internet Archit. 2021, 5, 468–480. [Google Scholar] [CrossRef] [Green Version]
  3. Shen, X.; Jiang, H.; Liu, D.; Yang, K.; Deng, F.; Lui, J.C.S.; Luo, J. PupilRec: Leveraging pupil morphology for recommending on smartphones. IEEE Internet Things J. 2022, 9, 15538–15553. [Google Scholar] [CrossRef]
  4. Yan, L.; Shi, Y.; Wei, M.; Wu, Y. Multi-feature fusing local directional ternary pattern for facial expressions signal recognition based on video communication system. Alex. Eng. J. 2023, 63, 307–320. [Google Scholar] [CrossRef]
  5. Khdier, H.Y.; Jasim, W.M.; Aliesawi, S.A. Deep learning algorithms based voiceprint recognition system in noisy environment. J. Phys. Conf. Ser. 2021, 1804, 12–42. [Google Scholar] [CrossRef]
  6. Sun, W.Z.; Wang, J.S.; Zheng, B.W.; Zhong-Feng, L. A novel convolutional neural network voiceprint recognition method based on improved pooling method and dropout idea. IAENG Int. J. Comput. Sci. 2021, 48, 202–212. [Google Scholar]
  7. Hong, Z.; Yue, L.; Wang, W.; Zeng, X. Research on end-to-end voiceprint recognition model based on convolutional neural network. J. Web Eng. 2021, 20, 1573–1586. [Google Scholar]
  8. Bahmaninezhad, F.; Zhang, C.; Hansen, J.H.L. An investigation of domain adaptation in speaker embedding space for speaker recognition. Speech Commun. 2021, 129, 7–16. [Google Scholar] [CrossRef]
  9. Yu, H.K.; Nam, S.H.; Hong, S.B.; Park, K.R. GRA-GAN: Generative adversarial network for image style transfer of gender, race, and age. Expert Syst. Appl. 2022, 198, 2–20. [Google Scholar]
  10. Wang, C.; Luo, D.; Liu, Y.; Xu, B.; Zhou, Y. Near-surface pedestrian detection method based on deep learning for UAVs in low illumination environments. Opt. Eng. 2022, 61, 2–19. [Google Scholar] [CrossRef]
  11. Bai, Z.; Zhang, X.L. Speaker recognition based on deep learning: An overview. Neural Netw. 2021, 140, 65–99. [Google Scholar] [CrossRef] [PubMed]
  12. Wang, J.; Guo, S.; Huang, R.; Li, L.; Zhang, X.; Jiao, L. Dual-channel capsule generation adversarial network for hyperspectral image classification. Trans. Geosci. Remote Sens. 2021, 60, 2–16. [Google Scholar] [CrossRef]
  13. Shan, S.; Liu, J.; Dun, Y. Prospect of voiceprint recognition based on deep learning. J. Phys. Conf. Ser. 2021, 18, 12–46. [Google Scholar] [CrossRef]
  14. Ji, H.; Lei, X.; Xu, Q.; Huang, C.; Ye, T.; Yuan, S. Research on characteristics of acoustic signal of typical partial discharge models. Glob. Energy Interconnect. 2022, 5, 118–130. [Google Scholar] [CrossRef]
  15. Cai, R.; Wang, Q.; Hou, Y.; Liu, H. Event monitoring of transformer discharge sounds based on voiceprint. J. Phys. Conf. Ser. 2021, 2066, 66–67. [Google Scholar] [CrossRef]
  16. Qian, W.; Xu, Y.; Zuo, W.; Li, H. Self-sparse generative adversarial networks. CAAI Artif. Intell. Res. 2022, 1, 68–78. [Google Scholar] [CrossRef]
  17. Kim, J.I.; Gang, H.S.; Pyun, J.Y.; Goo-Rak, K. Implementation of QR code recognition technology using smartphone camera for indoor positioning. Energies 2021, 14, 2759. [Google Scholar] [CrossRef]
  18. Zhu, K.; Ma, H.; Wang, J.; Yu, C. Optimization research on abnormal diagnosis of transformer voiceprint recognition based on improved wasserstein GAN. J. Phys. Conf. Ser. 2021, 17, 12–67. [Google Scholar] [CrossRef]
  19. Yang, Y.; Song, X. Research on face intelligent perception technology integrating deep learning under different illumination intensities. J. Comput. Cogn. Eng. 2022, 1, 32–36. [Google Scholar] [CrossRef]
  20. Amin, S.N.; Shivakumara, P.; Jun, T.X. An augmented reality-based approach for designing interactive food menu of restaurant using android. Artif. Intell. Appl. 2023, 1, 26–34. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of voice storage database.
Figure 1. Schematic diagram of voice storage database.
Electronics 12 03309 g001
Figure 2. Voiceprint recognition flowchart.
Figure 2. Voiceprint recognition flowchart.
Electronics 12 03309 g002
Figure 3. Schematic diagram of text-independent speaker recognition network structure based on channel confrontation.
Figure 3. Schematic diagram of text-independent speaker recognition network structure based on channel confrontation.
Electronics 12 03309 g003
Figure 4. Schematic diagram of a speaker recognition system for the field of information security.
Figure 4. Schematic diagram of a speaker recognition system for the field of information security.
Electronics 12 03309 g004
Figure 5. Plug-in process diagram.
Figure 5. Plug-in process diagram.
Electronics 12 03309 g005
Figure 6. Schematic diagram of overlapping data with different speech overlap rates.
Figure 6. Schematic diagram of overlapping data with different speech overlap rates.
Electronics 12 03309 g006
Figure 7. The recall rate of EER and Top1 under CAT method varies with β schematic diagram of changes.
Figure 7. The recall rate of EER and Top1 under CAT method varies with β schematic diagram of changes.
Electronics 12 03309 g007
Figure 8. Schematic diagram of EER corresponding to different weight losses.
Figure 8. Schematic diagram of EER corresponding to different weight losses.
Electronics 12 03309 g008
Figure 9. Illustrative diagram of attention weight.
Figure 9. Illustrative diagram of attention weight.
Electronics 12 03309 g009
Table 1. Comparison of EER (%) results between CAT method and other methods on the development set.
Table 1. Comparison of EER (%) results between CAT method and other methods on the development set.
SystemEER
First TrainingSecond TrainingThird TrainingFourth Training
I-vector8.71%8.82%8.62%8.83%
CNN6.23%6.13%6.24%6.34%
CAT without D26.42%6.41%6.57%6.42%
CAT5.81%5.91%5.70%5.83%
Table 2. Comparison of TopN (%) results between CAT method and other methods on the test set.
Table 2. Comparison of TopN (%) results between CAT method and other methods on the test set.
SystemRecall
Top1Top5Top10
I-vector57.11%66.22%70.13%
CNN69.21%77.23%79.91%
CAT without D268.92%77.81%79.84%
CAT76.21%83.15%84.92%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gui, S.; Zhou, C.; Wang, H.; Gao, T. Application of Voiceprint Recognition Technology Based on Channel Confrontation Training in the Field of Information Security. Electronics 2023, 12, 3309. https://doi.org/10.3390/electronics12153309

AMA Style

Gui S, Zhou C, Wang H, Gao T. Application of Voiceprint Recognition Technology Based on Channel Confrontation Training in the Field of Information Security. Electronics. 2023; 12(15):3309. https://doi.org/10.3390/electronics12153309

Chicago/Turabian Style

Gui, Suying, Chuan Zhou, Hao Wang, and Tiegang Gao. 2023. "Application of Voiceprint Recognition Technology Based on Channel Confrontation Training in the Field of Information Security" Electronics 12, no. 15: 3309. https://doi.org/10.3390/electronics12153309

APA Style

Gui, S., Zhou, C., Wang, H., & Gao, T. (2023). Application of Voiceprint Recognition Technology Based on Channel Confrontation Training in the Field of Information Security. Electronics, 12(15), 3309. https://doi.org/10.3390/electronics12153309

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop