期刊文献+

基于半监督学习的即时语音通信隐藏检测

Detection of instant voice communication steganography using semi-supervised learning
原文传递
导出
摘要 传统即时通信隐藏检测方法主要采用基于监督学习的检测方式,导致部署前需大量复杂的人工预处理,同时训练数据集与测试数据集分布的差异会影响检测的准确率。针对以上问题,该文首先重点针对即时语音通信隐蔽信道提出了一种全新的半监督混合式检测模型,该模型不存在人工挑选与标注训练数据集的过程,解决检测操作人工预处理复杂和适用性差的问题;然后设计了基于自学习的多准则融合模块,用于自行生成伪标注数据集,其可信度和代表度共同决定了即时语音通信隐藏检测系统的性能,且不存在语音通信隐藏检测中训练与测试集分布失配的情况;最后针对即时语音通信中常见的低码率语音流载体进行实验分析,在失配状况下基于有监督的检测方法以及无监督检测方法相比,其准确率具有明显优势;当训练样本与测试样本的分布不匹配时,该方法相比有监督的检测方法所受的影响更小。同时,实验显示该方法可以适用于多种编码检测过程。 Existing instant voice communication steganalysis schemes are mainly based on supervised learning classifiers. These kinds of methods need large amounts of pre-processing and training and their accuracy can he easily destroyed by differences between the distribution of the training and testing data sets. This paper describes a semi-supervised hybrid detection model to improve detection which removes the manually annotated training data set, so this model is simpler and gives better detection scopes. This paper also describes a self-learning, multi-criteria fusion module which can automatically generate pseudo-labelled sets and combines the confidence and representative levels to judge the performance of instant voice communica tion steganalysis. There is no distribution mismatch between the testing data and the training data in this method. Tests with common low bit-rate speech coding carriers show that this method is more accurate than the un-supervised method and the supervised method in mismatched conditions. When the distributions of the training and testing data sets differ, this method is less affected than the supervised method. The tests also show that this method can be deployed on different kinds of speech codecs.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2015年第11期1246-1252,共7页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金重点项目(U1405254 61472092) 中国博士后基金项目(2015M581101)
关键词 即时语音通信 半监督学习 信息隐藏检测 可信度 代表度 instant voice communication semi-supervised learning steganalysis confidence level representative level
  • 相关文献

参考文献1

二级参考文献24

  • 1Avcibas, I., 2006. Audio steganalysis with contentindependent distortion measure. IEEE Signal Process. Lett., 13(2):92-95. [doi:10.1109/LSP.2005.862152].
  • 2Chang, C.C., Lin, C.J., 2001. LIBSVM: a Library for Support Vector Machines. Available from http://www.csie.ntu. edu.tw/-cjlin/libsvm [Accessed on May 9, 2011].
  • 3Chen, B., Wornell, G.W., 2001. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf Theory, 47(4):1423-1443. [doi:10.1109/18.923725].
  • 4Hafiz, M., 2008. Steganalysis of QIM Steganography Using Irregularity Measure. Proc. 10th ACM Workshop on Multimedia and Security, p.149-158. [doi:10.11451 1411328.1411355].
  • 5Hafiz, M., 2010. Statistical Modeling of Footprints of QIM Steganography. IEEE Int. Conf. on Multi-media and Expo, p.1487 -1492. [doi: 1 0.11 09/1CME.201 0.5582954].
  • 6Hafiz, M., Subbalakshmi, K.P., Chandramouli, R., 2008. Nonparametric steganalysis of QIM data hiding using approximate entropy. SPIE, 6819:681914. [doi:10.11171 12.767313].
  • 7Huang, Y., Xiao, B., 2008. Implementation of Covert Communication Based on Steganography. Proc. 4th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, p.1512-1515. [doi:10.1109/I1H-MSP.2008.174].
  • 8Huang, Y., Tang, S., Zhang, Y., 2011a. Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis. lET Commun., 5(7): 929-936. [doi: 1 0.1 049/iet-com.201 0.0348].
  • 9Huang, Y., Tang, S., Bao, C., Yip, Y.J., 2011b. Steganalysis of compressed speech to detect covert voice over Internet protocol channels. lET In! Secur., 5(1):26-32. [doi:10. 1 049/iet-ifs.201 0.0032].
  • 10ITU-T, 1996a. ITU-T Recommendation G.723.1: Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbit/s. ITU-T, Geneva.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部