High-roubustness keystroke recognition method based on acoustic spatial gradient
Papers|更新时间:2024-06-05
|
High-roubustness keystroke recognition method based on acoustic spatial gradient
Journal on CommunicationsVol. 41, Issue 5, Pages: 96-103(2020)
作者机构:
1. 辽宁工程技术大学电子与信息工程学院,辽宁 葫芦岛 125105
2. 北京邮电大学电子工程学院,北京 100876
3. 吉林大学通信工程学院,吉林 长春 130022
作者简介:
基金信息:
The National Key Research and Development Program of China(2018YFB1403300);The Project of Educational Commission of Liaoning Province(LJ2017QL013);Liaoning Province Doctor Startup Fund(20170520098);The Natural Science Foundation of Liaoning Province(2019-ZD-0038);The Project of Innovative Talents Support of Liaoning Province(LR2016045)
For the fluctuation of CFCC caused by environmental noise is the main reason for the low accuracy of keystroke detection
the spatial characteristics of adjacent between CFCC were studied
and the spatial gradient structure of CFCC based on points was established.On this basis
the effect of CFCC spatial gradient on keystroke content recognition and the selection of precise neighborhood points were studied on training and testing.Finally
a high-robustness keystroke recognition algorithm based on acoustic signals was constructed.Extensive experiments in different environments demonstrate that the proposed CFCC spatial gradient sound feature achieves great performance and the recognition accuracy is 96.15%.
ZHANG C . Application of neural network algorithm in electromagnetic [D ] . Beijing:Beijing University of Posts and Telecommunications , 2018 .
BAUER A O , . Some aspects of military line communications as deployed by the german armed forces prior to 1945 [C ] // In Proceedings of 5th Aunnual Colloquium,The History of Military Communications.[S.n.:s.l] . 1999 : 1 - 21 .
张南 . 计算机电磁信息泄露与视频信息认知研究 [D ] . 北京:北京邮电大学 , 2019 .
ZHANG N . Research on computer electromagnetic information leakage and video [D ] . Beijing:Beijing University of Posts and Telecommunications , 2019 .
ZHU T , MA Q , ZHANG S F , et al . Context-free attacks using keyboard acoustic emanations [C ] // ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2014 : 453 - 464 .
ABHISHEK S , SAXENA N . Keyboard emanations in remote voice calls:password leakage and noise(less) masking defense [C ] // ACM Conference on Data and Application Security and Privacy . New York:ACM Press , 2018 : 103 - 110 .
ASONOV D , AGRAWAL R . Keyboard acoustic emanations [C ] // IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2004 : 3 - 11 .
COMPAGNO A , CONTI M , LAIN D , et al . Don’t skype & type! Acoustic eavesdropping in voice-over-IP [C ] // ACM on Asia Conference on Computer and Communications Security . New York:ACM Press , 2017 : 703 - 715 .
DU H , YU Z W , XIAO D . Sensing keyboard input for computer activity recognition with a smartphone [C ] // ACM International Joint Conference on Pervasive and Ubiquitous Computing . New York:ACM Press , 2017 : 25 - 28 .
ZHENG X S , YANG S L , JIN N G , et al . Diva:distributed voronoi-based acoustic source localization with wireless sensornetworks [C ] // IEEE Conference on Computer Communications . Piscataway:IEEE Press , 2016 : 1 - 9 .
MI J W , FANG X L , QIU Y Y . Enhancement technology for the audio signal with nonstationary background noise [J ] . Chinese Journal of Scientific Instrument , 2017 , 38 ( 1 ): 17 - 38 .
SHEN W G , WANG W . Keystroke features recognition based on stable linear discriminant analysis [J ] . Journal on Communications , 2017 , 38 ( Z2 ): 26 - 29 .