Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们 横山亮次奖 百年刊庆
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  横山亮次奖  |  百年刊庆
清华大学学报(自然科学版)  2015, Vol. 55 Issue (11): 1246-1252    DOI: 10.16511/j.cnki.qhdxxb.2015.21.016
  电子工程 本期目录 | 过刊浏览 | 高级检索 |
基于半监督学习的即时语音通信隐藏检测
涂山山, 陶怀舟, 黄永峰
清华大学电子工程系, 北京 100084
Detection of instant voice communication steganography using semi-supervised learning
TU Shanshan, TAO Huaizhou, HUANG Yongfeng
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
全文: PDF(1340 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 传统即时通信隐藏检测方法主要采用基于监督学习的检测方式,导致部署前需大量复杂的人工预处理,同时训练数据集与测试数据集分布的差异会影响检测的准确率。针对以上问题,该文首先重点针对即时语音通信隐蔽信道提出了一种全新的半监督混合式检测模型,该模型不存在人工挑选与标注训练数据集的过程,解决检测操作人工预处理复杂和适用性差的问题;然后设计了基于自学习的多准则融合模块,用于自行生成伪标注数据集,其可信度和代表度共同决定了即时语音通信隐藏检测系统的性能,且不存在语音通信隐藏检测中训练与测试集分布失配的情况;最后针对即时语音通信中常见的低码率语音流载体进行实验分析,在失配状况下基于有监督的检测方法以及无监督检测方法相比,其准确率具有明显优势;当训练样本与测试样本的分布不匹配时,该方法相比有监督的检测方法所受的影响更小。同时,实验显示该方法可以适用于多种编码检测过程。
服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
涂山山
陶怀舟
黄永峰
关键词 即时语音通信半监督学习信息隐藏检测可信度代表度    
Abstract:Existing instant voice communication steganalysis schemes are mainly based on supervised learning classifiers. These kinds of methods need large amounts of pre-processing and training and their accuracy can be easily destroyed by differences between the distribution of the training and testing data sets. This paper describes a semi-supervised hybrid detection model to improve detection which removes the manually annotated training data set, so this model is simpler and gives better detection scopes. This paper also describes a self-learning, multi-criteria fusion module which can automatically generate pseudo-labelled sets and combines the confidence and representative levels to judge the performance of instant voice communication steganalysis. There is no distribution mismatch between the testing data and the training data in this method. Tests with common low bit-rate speech coding carriers show that this method is more accurate than the un-supervised method and the supervised method in mismatched conditions. When the distributions of the training and testing data sets differ, this method is less affected than the supervised method. The tests also show that this method can be deployed on different kinds of speech codecs.
Key wordsinstant voice communication    semi-supervised learning    steganalysis    confidence level    representative level
收稿日期: 2015-07-23      出版日期: 2015-11-15
ZTFLH:  TP309.2  
通讯作者: 黄永峰,教授,E-mail:yfhuang@tsinghua.edu.cn     E-mail: yfhuang@tsinghua.edu.cn
引用本文:   
涂山山, 陶怀舟, 黄永峰. 基于半监督学习的即时语音通信隐藏检测[J]. 清华大学学报(自然科学版), 2015, 55(11): 1246-1252.
TU Shanshan, TAO Huaizhou, HUANG Yongfeng. Detection of instant voice communication steganography using semi-supervised learning. Journal of Tsinghua University(Science and Technology), 2015, 55(11): 1246-1252.
链接本文:  
http://jst.tsinghuajournals.com/CN/10.16511/j.cnki.qhdxxb.2015.21.016  或          http://jst.tsinghuajournals.com/CN/Y2015/V55/I11/1246
  图1 基于半监督学习检测方案框架
  表1 本文方法对G.723.1编码下隐藏模式的检测准确率
  图2 本方法在不同迭代次数下准确率的变化
  图3 本文方法在不同语音片段时长下准确率的变化
  图4 本文方法在不同语音片段时长下与其他方法准确率的对比
  表2 最终η 在G.713.1编码下不同语音片段长度的变化
[1] Mazurczyk W. VoIP steganography and its detection:A survey[J]. ACM Computing Surveys, 2013, 46(2):Article No. 20.
[2] Mazurczyk W, Karas M, Szczypiorski K. SkyDe:A Skype-based steganographic method[J]. International Journal of Computers Communications & Control, 2013, 8(3):432-443.
[3] Kopiczko P, Mazurczyk W, Szczypiorski K. Stegtorrent:a steganographic method for the p2p file sharing service[C]//Proceedings of 2013 Security and Privacy Workshops(SPW). San Francisco, CA, USA:IEEE Press, 2013:151-157.
[4] 两年前废掉了短信现又瞄准了语音通信[EB/OL].[2015-07-28]. http://ec.ctiforum.com/jishu/qiye/qiyetong- xinjishu/jishitongxin/jishudongtai/433729.html. Two years ago WeChat gave up SMS, now is aiming at voice communication[EB/OL].[2015-07-28]. http://ec.ctiforum.com/jishu/qiye/qiyetongxinjishu/jishitongxin/jishudongtai/433729.html.(in Chinese)
[5] 看极端组织ISIS如何展开网络"恐怖营销"[EB/OL].[2015-07-28]. http://www.techweb.com.cn/news/2014-09-01/2070887.shtml. See the extreme organization ISIS how to expand the network "terrorism marketing"[EB/OL].[2015-07-28]. http://www.techweb.com.cn/news/2014-09-01/2070887.shtml.(in Chinese)
[6] LI Songbin, TAO Huaizhou, HUANG Yongfeng. Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis[J]. Journal of Zhejiang University SCIENCE C, 2012, 13(8):624-634.
[7] TIAN Hui, LIU Jin, LI Songbin. Improving security of quantization-index-modulation steganography in low bit-rate speech streams[J]. Multimedia Systems, 2014, 20(2):143-154.
[8] HUANG Yongfeng, TANG Shanyu, BAO Chunlan, et al. Steganalysis of compressed speech to detect covert voice over Internet protocol channels[J]. IET Information Security, 2011, 5(1):26-32.
[9] BAO Chunlan, HUANG Yongfeng, ZHU Chunyi. Steganalysis of compressed speech[C]//Proceedings of Multiconference on Computational Engineering in Systems Applications. Beijing, China:IEEE Press, 2006:5-10.
[10] LIU Qingzhong, SUNG AH, QIAN Mengyu. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(3):359-368.
[11] Koçal OH, YürüklüE, Avcibas I. Chaotic-type features for speech steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(4):651-661.
[12] Kraetzer C, Dittmann J. Pros and cons of Mel-cepstrum based audio steganalysis using SVM classification[J]. Information Hiding Lecture Notes on Computer Science, 2007, 4567:359-377.
[13] Janicki A, Mazurczyk W, Szczypiorski K. Steganalysis of transcoding steganography[J]. Ann. Telecommun. 2014, 69(7-8):449-460.
[14] HUANG Yongfeng, TANG Shanyu, ZHANG Yuan. Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis[J]. IET Communications, 2011, 5(7):929-936.
[15] HUANG Yongfeng, LIU Chenghao, TANG Shanyu, et al. Streganography integration into a low-bit rate speech codec[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(6):1865-1876.
[1] 陈元琳, 柴跃廷, 刘义, 徐扬. 基于群体偏好的交易评价可信度[J]. 清华大学学报(自然科学版), 2015, 55(5): 558-564,571.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 《清华大学学报(自然科学版)》编辑部
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn