[1]李燕,陶定元,林乐. 基于DTW模型补偿的伪装语音说话人识别研究[J].计算机技术与发展,2017,27(01):93-96.
 LI Yan-ping,TAO Ding-yuan,LIN Le. Study on Electronic Disguised Voice Speaker Recognition Based on DTW Model Compensation[J].,2017,27(01):93-96.
点击复制

 基于DTW模型补偿的伪装语音说话人识别研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年01期
页码:
93-96
栏目:
安全与防范
出版日期:
2017-01-10

文章信息/Info

Title:
 Study on Electronic Disguised Voice Speaker Recognition Based on DTW Model Compensation
文章编号:
1673-629X(2017)01-0093-04
作者:
 李燕陶定元林乐
 南京邮电大学 通信与信息工程学院
Author(s):
 LI Yan-pingTAO Ding-yuanLIN Le
关键词:
 电子伪装语音梅尔倒谱系数说话人识别动态时间规整矢量量化
Keywords:
 electronic disguised voiceMFCCspeaker recognitionDTWVQ
分类号:
TP302
文献标志码:
A
摘要:
 语音变声器及各种手机变声软件的出现,在提供了极其方便且丰富的娱乐交互体验的同时,也给语音通信带来了新的安全问题。由于其产生的电子伪装语音掩盖了语音本身的个性特征,对现有的说话人识别技术来说是一种挑战,且一旦被犯罪分子利用,后果将十分严重。因此,伪装语音说话人识别的研究成为当下的研究热点。提出一种针对电子伪装语音的说话人识别方法。对于由手机变声软件产生的电子伪装语音,提取该语音的梅尔倒谱系数( Mel Frequency Ceps-tral Coefficients,MFCC)作为特征参数,通过动态时间规整( Dynamic Time Warping,DTW)模型进行伪装程度鉴定,再利用矢量量化( Vector Quantization,VQ)模型进行说话人识别,从而设计了DTW与VQ相结合的电子伪装语音说话人识别系统。实验结果表明:该系统能够有效解决VQ说话人识别系统对电子伪装语音识别率过低的问题,识别效果得到了明显改善。
Abstract:
 The appearance of voice changer and various voice software of mobile phone provides a very convenient and rich entertainment interaction experience,amd at the same time,also gives voice communication new security issues. Electronic disguised voice produced masks the personality characteristics of voice itself,so the existing speaker recognition technology is a challenge,and once they are used by criminals,the consequences will be severe. Therefore,disguised voice speaker recognition is becoming a research hotspots. In view of electronic disguised voice produced by cell phone voice software,Mel Frequency Cepstral Coefficients ( MFCC) are extracted as the char-acteristic parameters of voice signals,identifying the disguised degree of it by DTW model and carrying out speaker recognition by VQ to design a speaker recognition system of electronic disguised voice. The experimental results show that the system can efficiently solve the problem that VQ has a poor recognition rate for electronic disguised voices,and improve the performance obviously.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(01):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(01):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(01):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(01):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(01):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(01):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(01):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(01):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(01):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(01):47.
[11]李燕萍,林乐,陶定元. 基于GMM统计特性的电子伪装语音鉴定研究[J].计算机技术与发展,2017,27(01):103.
 LI Yan-ping,LIN Le,TAO Ding-yuan. Research on Identification of Electronic Disguised Voice Based on GMM Statistical Parameters[J].,2017,27(01):103.

更新日期/Last Update: 2017-04-01