Audio steganography with AES for real-time covert voice over internet protocol communications

被引:8
作者
ShanYu, Tang [1 ]
YiJing, Jiang [1 ]
LiPing, Zhang [1 ]
ZhangBing, Zhou [2 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan 430074, Peoples R China
[2] China Univ Geosci, Sch Informat Engn, Beijing 100083, Peoples R China
基金
中国国家自然科学基金;
关键词
VoIP; steganography; AES; covert communication; Mann-Whitney-Wilcoxon; LSB;
D O I
10.1007/s11432-014-5063-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a popular real-time service on the Internet, Voice over Internet Protocol (VoIP) communication attracts more and more attention from the researchers in the information security field. In this study, we proposed a VoIP steganographic algorithm with variable embedding capacities, incorporating AES and key distribution, to realize a real-time covert VoIP communication. The covert communication system was implemented by embedding a secret message encrypted with symmetric cryptography AES-128 into audio signals encoded by PCM codec. At the beginning of each VoIP call, a symmetric session key (SK) was assigned to the receiver with a session initiation protocol-based authentication method. The secret message was encrypted and then embedded into audio packets with different embedding algorithms before sending them, so as to meet the real-time requirements of VoIP communications. For each audio packet, the embedding capacity was calculated according to the specific embedding algorithm used. The encryption and embedding processes were almost synchronized. The time cost of encryption was so short that it could be ignored. As a result of AES-based steganography, observers could not detect the hidden message using simple statistical analysis. At the receiving end, the corresponding algorithm along with the SK was employed to retrieve the original secret message from the audio signals. Performance evaluation with state-of-the-art network equipment and security tests conducted using the Mann-Whitney-Wilcoxon method indicated that the proposed steganographic algorithm is secure, effective, and robust.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [41] Real-Time Implementation of Steganography in Medical Images using Integer Wavelet Transform
    Lavania, Shubham
    Matey, Palash Sushil
    Thanikaiselvan, V
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 270 - 274
  • [42] Detection and prevention of spam over Internet telephony in Voice over Internet Protocol networks using Markov chain with incremental SVM
    Vennila, G.
    Manikandan, M. S. K.
    Suresh, M. N.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)
  • [43] Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review
    A. H. Mohsin
    A. A. Zaidan
    B. B. Zaidan
    Shamsul Arrieya bin Ariffin
    O. S. Albahri
    A. S. Albahri
    M. A. Alsalem
    K. I. Mohammed
    M. Hashim
    Journal of Medical Systems, 2018, 42
  • [44] Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review
    Mohsin, A. H.
    Zaidan, A. A.
    Zaidan, B. B.
    bin Ariffin, Shamsul Arrieya
    Albahri, O. S.
    Albahri, A. S.
    Alsalem, M. A.
    Mohammed, K. I.
    Hashim, M.
    JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (12)
  • [45] Detection of Human and Computer Voice Spammers Using Hidden Markov Model in Voice over Internet Protocol Network
    Vennila, G.
    Manikandan, M. S. K.
    7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2017), 2017, 115 : 588 - 595
  • [46] Comparative analysis of traditional telephone and voice-over-internet protocol (VoIP) systems
    Chong, HM
    Matthews, HS
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL SYMPOSIUM ON ELECTRONICS & THE ENVIRONMENT, CONFERENCE RECORD, 2004, : 106 - 111
  • [47] Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice Over Internet Protocol
    Budiyanto, Setiyo
    Gunawan, Dadang
    IEEE ACCESS, 2023, 11 : 60853 - 60865
  • [48] Voice Over Internet Protocol: A Collaborative Tool to Advance Communication Processes for Elderly People
    Zamikhaya, Mapundu
    Van der Walt, J. S.
    Simonnet, Thierry
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1083 - 1088
  • [49] Security model for emergency real-time communications in autonomous networks
    Emmanouil A. Panaousis
    Christos Politis
    Konstantinos Birkos
    Christos Papageorgiou
    Tasos Dagiuklas
    Information Systems Frontiers, 2012, 14 : 541 - 553
  • [50] Security model for emergency real-time communications in autonomous networks
    Panaousis, Emmanouil A.
    Politis, Christos
    Birkos, Konstantinos
    Papageorgiou, Christos
    Dagiuklas, Tasos
    INFORMATION SYSTEMS FRONTIERS, 2012, 14 (03) : 541 - 553