Covert voice over internet protocol communications based on spatial model

被引:11
作者
Huang YongFeng [1 ,2 ]
Tang ShanYu [3 ,4 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China
[3] China Univ Geosci, Sch Comp Sci, Wuhan 430074, Peoples R China
[4] London Metropolitan Univ, Dept Comp, London N7 8DB, England
基金
中国国家自然科学基金;
关键词
covert communication; multimedia networking; VoIP; data security; CHANNELS; SPEECH; DESIGN;
D O I
10.1007/s11431-015-5955-4
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper presents a new spatial steganography model for covert communications over voice over internet protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert VoIP communications. By taking into account the variation characteristics of VoIP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on VoIP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of VoIP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert VoIP communications.
引用
收藏
页码:117 / 127
页数:11
相关论文
共 24 条
[1]   A technique of lossless steganography for G.711 telephony speech [J].
Aoki, Naofumi .
2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, :608-611
[2]   A band extension-technique for G.711 speech using steganography [J].
Aoki, Naofumi .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2006, E89B (06) :1896-1898
[3]   Covert channels based on jitter field of the RTCP header [J].
Bai, Linda Yunlu ;
Huang, Yongfeng ;
Hou, Guannan ;
Xiao, Bo .
2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, :1388-1391
[4]  
Bo X, 2008, J XIDIAN U, V35, P554
[5]   An information-theoretic model for steganography [J].
Cachin, C .
INFORMATION AND COMPUTATION, 2004, 192 (01) :41-56
[6]  
Druid, 2011, REAL TIM STEG RTP
[7]   Steganalysis of compressed speech to detect covert voice over Internet protocol channels [J].
Huang, Y. ;
Tang, S. ;
Bao, C. ;
Yip, Y. J. .
IET INFORMATION SECURITY, 2011, 5 (01) :26-32
[8]   Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis [J].
Huang, Y. F. ;
Tang, S. ;
Zhang, Y. .
IET COMMUNICATIONS, 2011, 5 (07) :929-936
[9]   Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec [J].
Huang, Yong Feng ;
Tang, Shanyu ;
Yuan, Jian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :296-306
[10]   Implementation of covert communication based on steganography [J].
Huang Yongfeng ;
Xiao Bo ;
Xiao Honghua .
2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, :1512-1515