Audio steganography with AES for real-time covert voice over internet protocol communications

被引:8
|
作者
ShanYu, Tang [1 ]
YiJing, Jiang [1 ]
LiPing, Zhang [1 ]
ZhangBing, Zhou [2 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan 430074, Peoples R China
[2] China Univ Geosci, Sch Informat Engn, Beijing 100083, Peoples R China
基金
中国国家自然科学基金;
关键词
VoIP; steganography; AES; covert communication; Mann-Whitney-Wilcoxon; LSB;
D O I
10.1007/s11432-014-5063-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a popular real-time service on the Internet, Voice over Internet Protocol (VoIP) communication attracts more and more attention from the researchers in the information security field. In this study, we proposed a VoIP steganographic algorithm with variable embedding capacities, incorporating AES and key distribution, to realize a real-time covert VoIP communication. The covert communication system was implemented by embedding a secret message encrypted with symmetric cryptography AES-128 into audio signals encoded by PCM codec. At the beginning of each VoIP call, a symmetric session key (SK) was assigned to the receiver with a session initiation protocol-based authentication method. The secret message was encrypted and then embedded into audio packets with different embedding algorithms before sending them, so as to meet the real-time requirements of VoIP communications. For each audio packet, the embedding capacity was calculated according to the specific embedding algorithm used. The encryption and embedding processes were almost synchronized. The time cost of encryption was so short that it could be ignored. As a result of AES-based steganography, observers could not detect the hidden message using simple statistical analysis. At the receiving end, the corresponding algorithm along with the SK was employed to retrieve the original secret message from the audio signals. Performance evaluation with state-of-the-art network equipment and security tests conducted using the Mann-Whitney-Wilcoxon method indicated that the proposed steganographic algorithm is secure, effective, and robust.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [31] Real-time audio steganography attack based on automatic objective quality feedback
    Qi, Qilin
    Sharp, Aaron
    Peng, Dongming
    Sharif, Hamid
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (08) : 737 - 746
  • [32] A survey of error-concealment schemes for real-time audio and video transmissions over the Internet
    Wah, BW
    Su, X
    Lin, D
    INTERNATIONAL SYMPOSIUM ON MULTIMEDIA SOFTWARE ENGINEERING, PROCEEDINGS, 2000, : 17 - 24
  • [33] THE TIMED-TOKEN PROTOCOL FOR REAL-TIME COMMUNICATIONS
    MALCOLM, N
    ZHAO, W
    COMPUTER, 1994, 27 (01) : 35 - 41
  • [34] Development of an Ethernet protocol for industrial real-time communications
    Yiming, A
    Eisaka, T
    IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 1122 - 1125
  • [35] Real-time traffic transmissions over the Internet
    Furini, M
    Towsley, DF
    IEEE TRANSACTIONS ON MULTIMEDIA, 2001, 3 (01) : 33 - 40
  • [36] Real-time traffic transmission over the Internet
    Furini, M
    Towsley, D
    NETWORKING 2000, 2000, 1815 : 483 - 494
  • [37] Supporting real-time faxing over the Internet
    Jin, K
    Hui, SC
    Yeo, CK
    INTERNET APPLICATIONS, 1999, 1749 : 264 - 273
  • [38] Real-time multimedia services over Internet
    Benslimane, A
    ECUMN '2000: 1ST EUROPEAN CONFERENCE ON UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, 2000, : 253 - 261
  • [39] VoIP (Voice over Internet protocol)
    Davies, D
    CANADIAN MINING JOURNAL, 2005, 126 (06) : 9 - 9
  • [40] Securing Voice over Internet Protocol
    Ghafarian, Ahmad
    Draughorne, Randolph
    Hargraves, Shelley
    Grainger, Steven
    High, Stacy
    Jackson, Crystal
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 200 - 204