[go: up one dir, main page]

CN113053397A - Recording attack prevention identity authentication method, device and system - Google Patents

Recording attack prevention identity authentication method, device and system Download PDF

Info

Publication number
CN113053397A
CN113053397A CN202110238179.4A CN202110238179A CN113053397A CN 113053397 A CN113053397 A CN 113053397A CN 202110238179 A CN202110238179 A CN 202110238179A CN 113053397 A CN113053397 A CN 113053397A
Authority
CN
China
Prior art keywords
audio signal
low
frequency
signal
frequency signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110238179.4A
Other languages
Chinese (zh)
Inventor
杜文强
张明
关磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou Fenyinta Technology Co ltd
Original Assignee
Changzhou Fenyinta Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou Fenyinta Technology Co ltd filed Critical Changzhou Fenyinta Technology Co ltd
Priority to CN202110238179.4A priority Critical patent/CN113053397A/en
Publication of CN113053397A publication Critical patent/CN113053397A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/02Preprocessing operations, e.g. segment selection; Pattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal components; Feature selection or extraction
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/06Decision making techniques; Pattern matching strategies
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L21/00Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
    • G10L21/02Speech enhancement, e.g. noise reduction or echo cancellation
    • G10L21/0208Noise filtering
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/48Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
    • G10L25/51Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L21/00Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
    • G10L21/02Speech enhancement, e.g. noise reduction or echo cancellation
    • G10L21/0208Noise filtering
    • G10L2021/02082Noise filtering the noise being echo, reverberation of the speech

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computational Linguistics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Game Theory and Decision Science (AREA)
  • Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to the field of voiceprint recognition, in particular to a method, a device and a system for identity authentication for preventing recording attack, which comprise the following steps: acquiring an audio signal of a password access text of a user to be verified; carrying out low-frequency signal detection on the audio signal; judging whether the audio signal contains a low-frequency signal with a preset frequency, if so, judging that the audio signal is recorded and replayed, and verifying that the audio signal does not pass; if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not recorded and replayed, and performing conventional authentication; and when the audio signal of the password text of the user to be verified is obtained, playing a low-frequency signal with a preset frequency. The invention integrates the low-frequency encryption sound wave technology into the identity authentication to enhance the anti-recording attack technology, effectively improves the reliability of the voiceprint identity authentication method, and has concealment, convenience and low cost.

Description

Recording attack prevention identity authentication method, device and system
Technical Field
The invention belongs to the field of voiceprint recognition, and particularly relates to a method, a device and a system for identity authentication for preventing recording attack.
Background
Speaker recognition is one of biological recognition technologies, has the characteristics of simplicity, high efficiency and convenience, and has the main principle that the identity of a speaker can be automatically judged through a computer and a signal processing technology on the basis that voice information contains information capable of representing the characteristics of the speaker. In recent years, with the rapid development of information technology, voice signals are used as a non-contact identity information carrier, people can collect voice information from the ground through various mobile terminal devices at any time, the voice information is rapidly transmitted to a background server through a mobile network which widely exists nowadays, and convenient and fast identity authentication is realized through operation.
In the prior art, fig. 1 is a block diagram of a conventional speaker recognition system. FIG. 2 is a flow chart of a playback attack speaker authentication system in which (one) password text is read for a user and the system determines if the user is the principal. And (II) recording the password text for authenticating the user in the authentication process. And (III) the attacker takes the audio segment which is recorded in the graph II and contains secret password to attack the speaker authentication system.
The speaker recognition technology is widely applied to various identity authentication scenes, but in some scenes, risk factors exist: the voice of the speaker is easy to be recorded, and then the voice recording attack authentication system is used to be recorded and replayed in a financial payment scene and an entrance guard authentication scene, so that the important risk problem exists.
Disclosure of Invention
In order to solve the problem of serious risk of an authentication system in the prior art, the embodiment of the invention provides the following technical scheme:
in a first aspect, a method for identity authentication for preventing voice recording attack, includes:
sending a password text to a user to be verified;
acquiring an audio signal of the password text read by a user to be verified;
judging whether the audio signal contains a low-frequency signal with a preset frequency, if so, judging that the audio signal is recorded and replayed, and verifying that the audio signal does not pass;
if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not recorded or replayed, and performing conventional authentication;
and when waiting to acquire the audio signal of the password text read by the user to be verified, playing a low-frequency signal with a preset frequency.
Further, the low-frequency signal detection of the audio signal includes:
carrying out feature extraction on the audio signal to obtain a feature extraction result;
and according to the feature extraction result, carrying out low-frequency signal detection on the feature extraction result.
Further, if the audio signal does not include the low-frequency signal with the preset frequency, it is determined that the audio signal is not a playback sound, and a normal authentication is performed, where the normal authentication includes:
judging whether the audio signal is a speaker to obtain a judgment result;
if the judgment result is the speaker, the authentication is passed;
and if the judgment result is that the speaker is not the speaker, refusing to pass the authentication.
Further, the determining whether the audio signal is a speaker to obtain a determination result includes:
comparing the audio signal with the registered voice, and scoring the spoken audio signal according to a preset threshold value to obtain a scoring result;
if the scoring result is higher than a preset threshold value, judging that the audio signal is a speaker;
and if the scoring result is lower than a preset threshold value, judging that the audio signal is a non-speaker.
Further, the audio signal includes time information and position information.
In a second aspect, an identity authentication apparatus for preventing a voice recording attack includes:
the sending module is used for sending the password text to the user to be verified;
the obtaining module is used for obtaining an audio signal of the password text read by a user to be verified;
the encrypted low-frequency signal detection module is used for detecting the low-frequency signal of the audio signal;
the judging module is used for judging whether the audio signal contains an encrypted low-frequency signal or not, if the audio signal contains the encrypted low-frequency signal, the audio signal is judged to be recorded and replayed, and the verification is not passed;
if the audio signal does not contain the encrypted low-frequency sound wave, judging that the audio signal is not recorded and replayed, and performing conventional authentication;
the low-frequency signal playing module is used for playing a low-frequency signal with a preset frequency when the audio signal of the password access text of the user to be verified is obtained;
and the echo cancellation module is used for canceling the low-frequency signal played by the current low-frequency signal playing module.
In a third aspect, a voice recording attack prevention identity authentication system comprises a voice recording attack prevention identity authentication device.
The embodiment of the invention provides a method, a device and a system for identity authentication for preventing recording attack, which comprise the following steps: acquiring an audio signal of a password access text of a user to be verified; carrying out low-frequency signal detection on the audio signal; judging whether the audio signal contains a low-frequency signal with a preset frequency, if so, judging that the audio signal is recorded and replayed, and verifying that the audio signal does not pass; if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not recorded and replayed, and performing conventional authentication; and when the audio signal of the password text of the user to be verified is obtained, playing a low-frequency signal with a preset frequency. The invention integrates the low-frequency encryption sound wave technology into the identity authentication to enhance the anti-recording attack technology, effectively improves the reliability of the voiceprint identity authentication method, and has concealment, convenience and low cost.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a block diagram of a conventional speaker recognition system.
Fig. 2 is a flow diagram of a playback attack speaker authentication system.
Fig. 3 is a flowchart of the identity authentication method for preventing the record attack according to the embodiment of the present invention.
Fig. 4 is a structural diagram of an identity authentication device for preventing a recording attack in an embodiment of the present invention.
Reference numerals:
1-a sending module; 2-an acquisition module; 3-encrypting the low-frequency signal detection module; 4-a judging module; 5-a low frequency signal playing module; 6-echo cancellation module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
As shown in fig. 3, a step diagram of an identity authentication method for preventing a recording attack in an embodiment of the present invention is shown, including:
step S11, sending password text to the user to be verified;
step S12, acquiring an audio signal of a password text read by a user to be verified;
step S13, low-frequency signal detection is carried out on the audio signal;
step S14, determining whether the audio signal includes a low frequency signal with a predetermined frequency,
step S15, if the audio signal contains a low-frequency signal with a preset frequency, the audio signal is judged to be recorded and replayed, and the verification is not passed;
step S16, if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not the recording playback, and performing conventional authentication;
and when waiting to acquire the audio signal of the password text read by the user to be verified, playing a low-frequency signal with a preset frequency.
It should be noted that, since the range of the sound frequency perceived by the human ear is approximately in the range of 500-4000Hz, that is, above or below this frequency range, the human ear cannot easily perceive the sound wave, and if the sound wave below this frequency range is played, the sound wave is hidden because it exceeds the range of the human ear.
Therefore, the low-frequency signal of preset frequency is played in the application, so that the human ears cannot perceive the low-frequency signal.
It can be understood that the identity authentication method for preventing the record attack provided by the embodiment of the invention comprises the following steps: acquiring an audio signal of a password access text of a user to be verified; carrying out low-frequency signal detection on the audio signal; judging whether the audio signal contains a low-frequency signal with a preset frequency, if so, judging that the audio signal is recorded and replayed, and verifying that the audio signal does not pass; if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not recorded and replayed, and performing conventional authentication; and when the audio signal of the password text of the user to be verified is obtained, playing a low-frequency signal with a preset frequency. The invention integrates the low-frequency encryption sound wave technology into the identity authentication to enhance the anti-recording attack technology, effectively improves the reliability of the voiceprint identity authentication method, and has concealment, convenience and low cost.
As a further improvement of the above method, in some embodiments,
low frequency signal detection of an audio signal, comprising:
carrying out feature extraction on the audio signal to obtain a feature extraction result;
and according to the feature extraction result, carrying out low-frequency signal detection on the feature extraction result.
In one embodiment, if the audio signal does not include a low-frequency signal with a preset frequency, it is determined that the audio signal is not a playback sound, and performing a normal authentication, where the normal authentication includes:
judging whether the audio signal is a speaker to obtain a judgment result;
if the judgment result is that the speaker is the speaker, the authentication is passed;
if the judgment result is that the speaker is not the speaker, the authentication is refused to pass.
In some embodiments, determining whether the audio signal is a speaker and obtaining the determination result includes:
comparing the audio signal with the registered voice, and scoring the spoken audio signal according to a preset threshold value to obtain a scoring result;
if the scoring result is higher than a preset threshold value, judging that the audio signal is a speaker;
and if the scoring result is lower than a preset threshold value, judging that the audio signal is a non-speaker.
It should be noted that the speaker identification means to confirm the identity of the speaker by using known audio and voice information. The method mainly comprises speaker confirmation and speaker identification:
speaker identification (Automatic speaker identification): confirming whether a student A speaks from a group of people;
speaker verification (Automatic speaker verification): it was confirmed whether or not the word was a student.
Speaker recognition, commonly known as "voiceprint recognition," is one of biometric technologies, and is mainly used in authentication scenarios because of uniqueness and stability of these biometrics, like fingerprint recognition and iris recognition. For example, after the public security organization extracts the recording clues of the telecommunication fraud case, the voiceprint recognition technology can be used for judging whether the person is a fleeing person or a rescissing person; the unlocking can be verified by using the voiceprint recognition technology on the smart phone as well as the fingerprint.
In some embodiments, the audio signal includes time information and location information.
The system also comprises a step of analyzing time information and position information in the audio to enhance the technology of preventing the record attack, thereby effectively improving the reliability of the voiceprint identity authentication method.
As shown in fig. 4, a structure diagram of an identity authentication device for preventing record attack in an embodiment of the present invention includes:
the sending module 1 is used for sending a password text to a user to be verified;
the acquisition module 2 is used for acquiring an audio signal of a password text read by a user to be verified;
the encrypted low-frequency signal detection module 3 is used for detecting the low-frequency signal of the audio signal;
the judging module 4 is used for judging whether the audio signal contains the encrypted low-frequency signal, if the audio signal contains the encrypted low-frequency signal, the audio signal is judged to be recorded and replayed, and the verification is not passed;
if the audio signal does not contain the encrypted low-frequency sound wave, judging that the audio signal is not recorded and replayed, and performing conventional authentication;
the low-frequency signal playing module 5 is used for playing a low-frequency signal with a preset frequency when the audio signal of the password access text of the user to be verified is obtained;
and the echo cancellation module 6 is used for canceling the low-frequency signal played by the current low-frequency signal playing module.
It can be understood that, in the present invention, the low frequency signal playing module is separately installed on the application device, and the low frequency signal playing module continuously plays the low frequency signal with the preset frequency in the using process. After a password is read by a user and an audio signal is input into the system, a low-frequency sound wave detection process is carried out, if the input audio signal is detected to have a low-frequency signal with past preset frequency, recording and replaying are judged, if the input audio signal is not detected, a conventional authentication process is carried out, and whether the input audio signal is a speaker or not is judged.
When the user inputs audio, the device plays low-frequency sound waves, and the sound waves are prevented from being recognized as recording by the system by mistake. Therefore, the echo cancellation module is additionally arranged and is a hardware module, and the echo cancellation module can offset low-frequency sound waves emitted by the system, so that system misjudgment is effectively avoided.
Compared with the conventional identity authentication process, the identity authentication device for preventing the record attack is additionally provided with three modules, one module is a low-frequency signal playing module, the other module is an encrypted low-frequency signal detecting module, and the echo eliminating module is used for eliminating the currently played confidential signal, and the low-frequency signal detecting module only detects the historical encrypted signal and ignores the influence of the currently played encrypted signal on the system. If the audio is detected to have historical encrypted low-frequency signals, the audio is considered to be recorded and replayed, and the authentication failure is directly judged.
The invention also provides an identity authentication system for preventing the record attack, which comprises an identity authentication device for preventing the record attack.
The invention provides a recording attack prevention identity authentication system, which is different from the traditional identity authentication method in that a low-frequency encryption sound wave watermark-based recording attack prevention identity authentication method is adopted, and the low-frequency encryption sound wave technology is integrated into identity authentication to enhance the recording attack prevention technology, so that the reliability of the voiceprint identity authentication method is effectively improved, and the voiceprint identity authentication system has the advantages of concealment, convenience and low cost.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware that is related to instructions of a program, and the program may be stored in a computer-readable storage medium, and when executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (7)

1. A recording attack prevention identity authentication method is characterized by comprising the following steps:
sending a password text to a user to be verified;
acquiring an audio signal of the password text read by a user to be verified;
carrying out low-frequency signal detection on the audio signal;
judging whether the audio signal contains a low-frequency signal with a preset frequency, if so, judging that the audio signal is recorded and replayed, and verifying that the audio signal does not pass;
if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not recorded or replayed, and performing conventional authentication;
and when waiting to acquire the audio signal of the password text read by the user to be verified, playing a low-frequency signal with a preset frequency.
2. The method of claim 1, wherein the low frequency signal detection of the audio signal comprises:
carrying out feature extraction on the audio signal to obtain a feature extraction result;
and according to the feature extraction result, carrying out low-frequency signal detection on the feature extraction result.
3. The method of claim 1, wherein if the audio signal does not include a low-frequency signal of the preset frequency, determining that the audio signal is not a playback sound, and performing a normal authentication, wherein the normal authentication includes:
judging whether the audio signal is a speaker to obtain a judgment result;
if the judgment result is the speaker, the authentication is passed;
and if the judgment result is that the speaker is not the speaker, refusing to pass the authentication.
4. The method of claim 3, wherein said determining whether the audio signal is a speaker, obtaining a determination result, comprises:
comparing the audio signal with the registered voice, and scoring the audio signal according to a preset threshold value to obtain a scoring result;
if the scoring result is higher than a preset threshold value, judging that the audio signal is a speaker;
and if the scoring result is lower than a preset threshold value, judging that the audio signal is a non-speaker.
5. The method of claim 1, wherein the audio signal comprises time information and location information.
6. An identity authentication device for preventing record attack, comprising:
the sending module is used for sending the password text to the user to be verified;
the obtaining module is used for obtaining an audio signal of the password text read by a user to be verified;
the encrypted low-frequency signal detection module is used for detecting the low-frequency signal of the audio signal;
the judging module is used for judging whether the audio signal contains an encrypted low-frequency signal or not, if the audio signal contains the encrypted low-frequency signal, the audio signal is judged to be recorded and replayed, and the verification is not passed;
if the audio signal does not contain the encrypted low-frequency sound wave, judging that the audio signal is not recorded and replayed, and performing conventional authentication;
the low-frequency signal playing module is used for playing a low-frequency signal with a preset frequency when the audio signal of the password access text of the user to be verified is obtained;
and the echo cancellation module is used for canceling the low-frequency signal played by the current low-frequency signal playing module.
7. An anti-voice attack identity authentication system, comprising the anti-voice attack identity authentication device of claim 6.
CN202110238179.4A 2021-03-04 2021-03-04 Recording attack prevention identity authentication method, device and system Pending CN113053397A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110238179.4A CN113053397A (en) 2021-03-04 2021-03-04 Recording attack prevention identity authentication method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110238179.4A CN113053397A (en) 2021-03-04 2021-03-04 Recording attack prevention identity authentication method, device and system

Publications (1)

Publication Number Publication Date
CN113053397A true CN113053397A (en) 2021-06-29

Family

ID=76509793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110238179.4A Pending CN113053397A (en) 2021-03-04 2021-03-04 Recording attack prevention identity authentication method, device and system

Country Status (1)

Country Link
CN (1) CN113053397A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114842882A (en) * 2022-01-11 2022-08-02 恒安嘉新(北京)科技股份公司 Audio and video detection method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201514943D0 (en) * 2015-08-21 2015-10-07 Validsoft Uk Ltd Replay attack detection
CN106961418A (en) * 2017-02-08 2017-07-18 北京捷通华声科技股份有限公司 Identity identifying method and identity authorization system
CN108039176A (en) * 2018-01-11 2018-05-15 广州势必可赢网络科技有限公司 Voiceprint authentication method and device for preventing recording attack and access control system
US10079024B1 (en) * 2016-08-19 2018-09-18 Amazon Technologies, Inc. Detecting replay attacks in voice-based authentication
CN109754812A (en) * 2019-01-30 2019-05-14 华南理工大学 A kind of voiceprint authentication method of the anti-recording attack detecting based on convolutional neural networks
CN110047184A (en) * 2019-04-24 2019-07-23 厦门快商通信息咨询有限公司 A kind of auth method and access control system of anti-recording attack
CN110459226A (en) * 2019-08-19 2019-11-15 效生软件科技(上海)有限公司 A method of voice is detected by vocal print engine or machine sound carries out identity veritification
CN111739561A (en) * 2020-05-21 2020-10-02 浙江大学 A living body detection method based on ultrasonic speech replay attack

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201514943D0 (en) * 2015-08-21 2015-10-07 Validsoft Uk Ltd Replay attack detection
US10079024B1 (en) * 2016-08-19 2018-09-18 Amazon Technologies, Inc. Detecting replay attacks in voice-based authentication
CN106961418A (en) * 2017-02-08 2017-07-18 北京捷通华声科技股份有限公司 Identity identifying method and identity authorization system
CN108039176A (en) * 2018-01-11 2018-05-15 广州势必可赢网络科技有限公司 Voiceprint authentication method and device for preventing recording attack and access control system
CN109754812A (en) * 2019-01-30 2019-05-14 华南理工大学 A kind of voiceprint authentication method of the anti-recording attack detecting based on convolutional neural networks
CN110047184A (en) * 2019-04-24 2019-07-23 厦门快商通信息咨询有限公司 A kind of auth method and access control system of anti-recording attack
CN110459226A (en) * 2019-08-19 2019-11-15 效生软件科技(上海)有限公司 A method of voice is detected by vocal print engine or machine sound carries out identity veritification
CN111739561A (en) * 2020-05-21 2020-10-02 浙江大学 A living body detection method based on ultrasonic speech replay attack

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114842882A (en) * 2022-01-11 2022-08-02 恒安嘉新(北京)科技股份公司 Audio and video detection method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US11011178B2 (en) Detecting replay attacks in voice-based authentication
US10135818B2 (en) User biological feature authentication method and system
US8396711B2 (en) Voice authentication system and method
US20180146370A1 (en) Method and apparatus for secured authentication using voice biometrics and watermarking
Gałka et al. Playback attack detection for text-dependent speaker verification over telephone channels
US20080270132A1 (en) Method and system to improve speaker verification accuracy by detecting repeat imposters
CN106778179B (en) An identity authentication method based on ultrasonic lip recognition
WO2019010054A1 (en) System and method for efficient liveness detection
CN102142254A (en) Voiceprint identification and voice identification-based recording and faking resistant identity confirmation method
US7949535B2 (en) User authentication system, fraudulent user determination method and computer program product
Gong et al. Protecting voice controlled systems using sound source identification based on acoustic cues
EP3740949A1 (en) Authenticating a user
US9767266B2 (en) Methods and systems for biometric-based user authentication by voice
CN103678977A (en) Method for protecting information security and electronic device thereof
WO2008015956A1 (en) Portable personal authentication method and electronic business transaction method
CN108417216A (en) Speech verification method, apparatus, computer equipment and storage medium
CN103078828A (en) Cloud-model voice authentication system
Chang et al. My voiceprint is my authenticator: A two-layer authentication approach using voiceprint for voice assistants
CN113053397A (en) Recording attack prevention identity authentication method, device and system
CN112151038B (en) Voice replay attack detection method, device, readable storage medium and electronic equipment
US20190267009A1 (en) Detection of a malicious attack
CN108985035B (en) Control method, device, storage medium and electronic device for user operation authority
BR102014023647A2 (en) method and system for fraud detection in voice processing based applications
US20220122627A1 (en) Voice replay attack detection method, medium, and device
JP4239512B2 (en) Personal identification device, personal identification method, information processing device, information processing method, information recording medium, identification method for user of information recording medium, personal identification system, program recording medium, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210629