“…With the rapid proliferation of Voice over Internet Protocol (VoIP) and other Peer-to-Peer (P2P) audio services such as Skype, covert channels using digital audio may be relatively easy to establish [9]. The inherent redundancy in the audio signal and its transient and unpredictable characteristics imply a high hidden capacity.…”
“…With the rapid proliferation of Voice over Internet Protocol (VoIP) and other Peer-to-Peer (P2P) audio services such as Skype, covert channels using digital audio may be relatively easy to establish [9]. The inherent redundancy in the audio signal and its transient and unpredictable characteristics imply a high hidden capacity.…”
“…The first VoIP steganographic methods to utilize the digital voice signal as a hidden data carrier were proposed by Dittmann et al [8]. The authors evaluated the existing audio steganography techniques, with a special focus on the solutions which were suitable for IP telephony.…”
The typical approach to steganography is to compress the covert data in order to limit its size, which is reasonable in the context of a limited steganographic bandwidth. Trancoding steganography (TranSteg) is a new IP telephony steganographic method that was recently proposed that offers high steganographic bandwidth while retaining good voice quality. In TranSteg, compression of the overt data is used to make space for the steganogram. In this paper we focus on analyzing the influence of the selection of speech codecs on hidden transmission performance, that is, which codecs would be the most advantageous ones for TranSteg. Therefore, by considering the codecs which are currently most popular for IP telephony we aim to find out which codecs should be chosen for transcoding to minimize the negative influence on voice quality while maximizing the obtained steganographic bandwidth.
“…From the literature [6][7][8], some researchers have noticed the advantages of and carried out useful studies on steganography over VoIP. Wang et al [6] proposed a scheme for transmitting secret speeches based on information hiding in VoIP systems.…”
Abstract-Differing from applying steganography on storage cover media, steganography on Voice over IP (VoIP) must often delicately balance between providing adequate security and maintaining low latency for real-time services. This paper presents a novel real-time steganography model for VoIP that aims at providing good security for secret messages without sacrificing real-time performance. We achieve this goal by employing the well-known least-significant-bits (LSB) substitution approach to provide a reasonable tradeoff between the adequate information hiding requirement (good security and sufficient capacity) and the low latency requirement for VoIP. Further, we incorporate the m-sequence technique to eliminate the correlation among secret messages to resist the statistical detection based on the fact that the distribution of the LSBs in the stego-speech is not uniform and to provide a short-term security protection of secret messages. To accurately recover secret messages at the receiver side, we design a synchronization mechanism based on the RSA key agreement and the synchronized sequence transmission using techniques of the protocol steganography, which can effectively enhance the flexibility of the covert communication system and be extended to other steganography schemes based on real-time systems. We evaluate the effectiveness of our model with ITU-T G.729a as the codec of the cover speech in StegTalk, a covert communication system based on VoIP. The experimental results demonstrate that our techniques provide good security and transparency for transmitting secret messages while adequately meeting the real-time requirement of VoIP. 1
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.