2021
DOI: 10.3390/s21041032
|View full text |Cite
|
Sign up to set email alerts
|

Steganography and Steganalysis in Voice over IP: A Review

Abstract: The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. Therefore, in recent years, steganography and steganography anal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 83 publications
0
7
0
Order By: Relevance
“…Wu [1] et al divide the VoIP-based steganography and steganalysis into three categories in the field of voice load: fixed codebook, linear prediction, and pitch delay. Nowadays, there are many studies on these three types of methods, but this article mainly elaborates the steganalysis based on pitch delay.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Wu [1] et al divide the VoIP-based steganography and steganalysis into three categories in the field of voice load: fixed codebook, linear prediction, and pitch delay. Nowadays, there are many studies on these three types of methods, but this article mainly elaborates the steganalysis based on pitch delay.…”
Section: Related Workmentioning
confidence: 99%
“…Each frame contains 4 subframes, and each subframe corresponds to a pitch delay. The structure for any frame , , (1,2,3,4), (1, 2,..., )…”
Section: Pitch Delay Characteristicmentioning
confidence: 99%
See 1 more Smart Citation
“…In practical applications, low-bit-rate speech codecs, such as the analysis-by-synthesis linear predictive coding (AbS-LPC), are widely used for compressed speech encoding. Therefore, most steganography methods based on compressed speech utilize AbS-LPC low-bit-rate speech codecs to achieve covert communication [11]. According to the different embedding positions of secret information, these information hiding methods can be mainly summarized as three categories.…”
Section: Introductionmentioning
confidence: 99%
“…The most commonly used steganography methods based on VoIP are to embed secret information into compressed speech streams by various low-bit-rate speech codecs, including G.723.1, G.729, internet low bit rate codec, and adaptive multi-rate codec [13]. The steganography methods are mainly divided into two categories.…”
Section: Introductionmentioning
confidence: 99%