基于混合分类器的AMR-WB语音隐写分析方法

被引:0
|
作者
吴彦鹏
陈明辉
曹荣鑫
孙奕
机构
[1] 厦门市美亚柏科信息股份有限公司
关键词
信息隐藏; 隐写分析; 自适应多速率宽带编码; 支持向量机; 长短期记忆模型;
D O I
暂无
中图分类号
TP181 [自动推理、机器学习]; TN918.4 [密码的加密与解密];
学科分类号
摘要
基于自适应多速率宽带语音编码的信息隐藏方法具有较强的隐蔽性和抗检测能力。为检测导谱频率矢量索引搜索中的量化索引调制,提出了一种基于校准技术和混合分类器的隐写分析方法。其中,一种基于长短期记忆模型的特征提取方法被用于提取导谱频率的关联性特征,导谱频率量化索引的概率分布则作为导谱频率的长时分布特征。以上两种特征通过校准技术处理后,被送入支持向量机中进行训练,可获得具有较高分类性能的分类器。实验结果表明,在不同嵌入率和语音长度下,所提方法均有较高的分类正确率。
引用
收藏
页码:2418 / 2424
页数:7
相关论文
共 10 条
  • [1] Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys[J]. HUANG YongFeng,TAO HuaiZhou,XIAO Bo,CHANG ChinChen. Science China(Technological Sciences). 2017(10)
  • [2] Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis[J]. Song-bin LI 1,2,Huai-zhou TAO1,2,Yong-feng HUANG 1,2(1Department of Electronic Engineering,Tsinghua University,Beijing 100084,China)(2Tsinghua National Laboratory for Information Science and Technology,Beijing 100084,China). Journal of Zhejiang University-Science C(Computers & Electronics). 2012(08)
  • [3] Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys[J] . YongFeng Huang,HuaiZhou Tao,Bo Xiao,ChinChen Chang. Science China Technological Sciences . 2017 (10)
  • [4] Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals[J] . Songbin Li,Yizhen Jia,C. -C. Jay Kuo,C.-C Jay Kuo. IEEE/ACM Transactions on Audio, Speech and Langua . 2017 (5)
  • [5] Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis[J] . Song-bin Li,Huai-zhou Tao,Yong-feng Huang. Journal of Zhejiang University SCIENCE C . 2012 (8)
  • [6] Improving performance of network covert timing channel through Huffman coding[J] . Jingzheng Wu,Yongji Wang,Liping Ding,Xiaofeng Liao. Mathematical and Computer Modelling . 2011 (1)
  • [7] Liquid: A detection-resistant covert timing channel based on IPD shaping[J] . Robert J. Walls,Kush Kothari,Matthew Wright. Computer Networks . 2010 (6)
  • [8] Digital image steganography: Survey and analysis of current methods[J] . Abbas Cheddad,Joan Condell,Kevin Curran,Paul Mc Kevitt. Signal Processing . 2009 (3)
  • [9] Long short-term memory
    Hochreiter, S
    Schmidhuber, J
    [J]. NEURAL COMPUTATION, 1997, 9 (08) : 1735 - 1780
  • [10] A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition .2 He J,Chen J,Xiao S,et al. Security&Communication Networks . 2018