Audio steganography with AES for real-time covert voice over internet protocol communications

被引:8
|
作者
ShanYu, Tang [1 ]
YiJing, Jiang [1 ]
LiPing, Zhang [1 ]
ZhangBing, Zhou [2 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan 430074, Peoples R China
[2] China Univ Geosci, Sch Informat Engn, Beijing 100083, Peoples R China
基金
中国国家自然科学基金;
关键词
VoIP; steganography; AES; covert communication; Mann-Whitney-Wilcoxon; LSB;
D O I
10.1007/s11432-014-5063-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a popular real-time service on the Internet, Voice over Internet Protocol (VoIP) communication attracts more and more attention from the researchers in the information security field. In this study, we proposed a VoIP steganographic algorithm with variable embedding capacities, incorporating AES and key distribution, to realize a real-time covert VoIP communication. The covert communication system was implemented by embedding a secret message encrypted with symmetric cryptography AES-128 into audio signals encoded by PCM codec. At the beginning of each VoIP call, a symmetric session key (SK) was assigned to the receiver with a session initiation protocol-based authentication method. The secret message was encrypted and then embedded into audio packets with different embedding algorithms before sending them, so as to meet the real-time requirements of VoIP communications. For each audio packet, the embedding capacity was calculated according to the specific embedding algorithm used. The encryption and embedding processes were almost synchronized. The time cost of encryption was so short that it could be ignored. As a result of AES-based steganography, observers could not detect the hidden message using simple statistical analysis. At the receiving end, the corresponding algorithm along with the SK was employed to retrieve the original secret message from the audio signals. Performance evaluation with state-of-the-art network equipment and security tests conducted using the Mann-Whitney-Wilcoxon method indicated that the proposed steganographic algorithm is secure, effective, and robust.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [1] Audio steganography with AES for real-time covert voice over internet protocol communications
    ShanYu Tang
    YiJing Jiang
    LiPing Zhang
    ZhangBing Zhou
    Science China Information Sciences, 2014, 57 : 1 - 14
  • [2] Audio steganography with AES for real-time covert voice over internet protocol communications
    TANG ShanYu
    JIANG YiJing
    ZHANG LiPing
    ZHOU ZhangBing
    Science China(Information Sciences), 2014, 57 (03) : 76 - 89
  • [3] Performance analysis of audio codecs over real-time transmission protocol (RTP) for voice services over Internet Protocol
    Light, J
    Bhuvaneshwari, A
    SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, : 351 - 356
  • [4] Covert voice over internet protocol communications based on spatial model
    Huang YongFeng
    Tang ShanYu
    SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2016, 59 (01) : 117 - 127
  • [5] Covert voice over internet protocol communications based on spatial model
    HUANG YongFeng
    TANG ShanYu
    Science China(Technological Sciences), 2016, 59 (01) : 117 - 127
  • [6] Covert voice over internet protocol communications based on spatial model
    HUANG YongFeng
    TANG ShanYu
    Science China(Technological Sciences) , 2016, (01) : 117 - 127
  • [7] Covert voice over internet protocol communications based on spatial model
    YongFeng Huang
    ShanYu Tang
    Science China Technological Sciences, 2016, 59 : 117 - 127
  • [8] An adaptive protocol for real-time fax communications over Internet
    Yeo, CK
    Hui, SC
    Soon, IY
    Lee, BS
    COMPUTER COMMUNICATIONS, 2001, 24 (12) : 1134 - 1146
  • [9] Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation
    Jiang, Yijing
    Tang, Shanyu
    Zhang, Liping
    Xiong, Muzhou
    Yip, Yau Jim
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2016, 12 (04)
  • [10] Real-time attacks on audio steganography
    Nutzinger, M. (marcus.nutzinger@gmail.com), 2012, Ubiquitous International (03):