VoIP Steganography Methods, a Survey

被引:7
作者
Deepikaa, S. [1 ]
Saravanan, R. [1 ]
机构
[1] Vellore Inst Technol, Vellore, Tamil Nadu, India
关键词
VoIP; LSB; PCM; QIM; PARTIAL-MATCHING STEGANOGRAPHY;
D O I
10.2478/cait-2019-0004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other file such as text, audio, video, so that the existence of the secret data is completely hidden. Recent research focuses much on utilizing Voice over Internet Protocol (VoIP) calls as a carrier for data hiding. VoIP calls are much preferred among internet users for its wide availability, dynamic time limit and low cost. This paper focuses on data hiding methods that uses VoIP as a carrier. The paper also analyzes the performance of the algorithms using the three metrics undetectability, bandwidth and robustness.
引用
收藏
页码:73 / 87
页数:15
相关论文
共 29 条
[1]  
Calpouzos G., 2013, COMPUTER SCI INFORM, V1, P153
[2]  
Caviglione L., 2017, P 12 INT C AV REL SE, P83
[3]   Comparative study of digital audio steganography techniques [J].
Djebbar, Fatiha ;
Ayad, Beghdad ;
Meraim, Karim Abed ;
Hamam, Habib .
EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING, 2012,
[4]   Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys [J].
Huang YongFeng ;
Tao HuaiZhou ;
Xiao Bo ;
Chang ChinChen .
SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2017, 60 (10) :1585-1596
[5]   Covert voice over internet protocol communications based on spatial model [J].
Huang YongFeng ;
Tang ShanYu .
SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2016, 59 (01) :117-127
[6]   Pitch-based steganography for Speex voice codec [J].
Janicki, Artur .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) :2923-2933
[7]   On the undetectability of transcoding steganography [J].
Janicki, Artur ;
Mazurczyk, Wojciech ;
Szczypiorski, Krzysztof .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3804-3814
[8]   Novel Method of Hiding Information in IP Telephony Using Pitch Approximation [J].
Janicki, Artur .
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, :429-435
[9]   Influence of speech codecs selection on transcoding steganography [J].
Janicki, Artur ;
Mazurczyk, Wojciech ;
Szczypiorski, Krzysztof .
TELECOMMUNICATION SYSTEMS, 2015, 59 (03) :305-315
[10]   Steganalysis of transcoding steganography [J].
Janicki, Artur ;
Mazurczyk, Wojciech ;
Szczypiorski, Krzysztof .
ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) :449-460