Proceedings of the 17th ACM International Conference on Multimedia 2009
DOI: 10.1145/1631272.1631412
|View full text |Cite
|
Sign up to set email alerts
|

Digital logic based encoding strategies for steganography on voice-over-IP

Abstract: This paper presents three encoding strategies based on digital logic for steganography on Voice over IP (VoIP), which aim to enhance the embedding transparency. Differing from previous approaches, our strategies reduce the embedding distortion by improving the similarity between the cover and the covert message using digital logical transformations, instead of reducing the amount of the substitution bits. Therefore, by contrast, our strategies will improve the embedding transparency without sacrificing the emb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…According to , an IP header contains 64 bits where hidden data can be transmitted (and the same with an upper‐level protocols, like RTP), so choosing a place or a technique to hide one bit per frame is an arbitrary decision. One can relatively easily elaborate a technique that would change the location of such a signaling bit, which would lower the probability of detection, as was proposed in .…”
Section: Proposed Steganographic Methodsmentioning
confidence: 99%
“…According to , an IP header contains 64 bits where hidden data can be transmitted (and the same with an upper‐level protocols, like RTP), so choosing a place or a technique to hide one bit per frame is an arbitrary decision. One can relatively easily elaborate a technique that would change the location of such a signaling bit, which would lower the probability of detection, as was proposed in .…”
Section: Proposed Steganographic Methodsmentioning
confidence: 99%
“…Steganography and steganalysis can be seen as the two sides of the same coin. Steganography is a technique to hide sensitive data into di erent types of carries [18,22,25,42], while steganalysis is a countermeasure to steganography, focusing on detecting the hidden data in a given carrier. Text steganography is a branch of steganography that conceals messages in a cover text (generally takes a sentence as the minimum unit) without rising suspicions [31,39].…”
Section: Introductionmentioning
confidence: 99%
“…With the advancement of computer communication networks, steganography has also penetrated into Internet based protocols and payloads [15], which brings both opportunities and challenges to communication security. In both of these two types of hiding applications, least significant steganography (LSB) related algorithms are always most popular and effective [10]. When it comes to low bit rate speech which is widely used as the payload in real time communications such as voice over Internet protocol (VoIP), restricted bandwidth and severe latency requirement are the most limiting factors for steganography [12].…”
Section: Introductionmentioning
confidence: 99%