Influence of speech codecs selection on transcoding steganography

@article{Janicki2015InfluenceOS,
  title={Influence of speech codecs selection on transcoding steganography},
  author={Artur Janicki and Wojciech Mazurczyk and Krzysztof Szczypiorski},
  journal={Telecommunication Systems},
  year={2015},
  volume={59},
  pages={305-315}
}
The typical approach to steganography is to compress the covert data in order to limit its size, which is reasonable in the context of a limited steganographic bandwidth. Trancoding steganography (TranSteg) is a new IP telephony steganographic method that was recently proposed that offers high steganographic bandwidth while retaining good voice quality. In TranSteg, compression of the overt data is used to make space for the steganogram. In this paper we focus on analyzing the influence of the… 
Steganalysis of transcoding steganography
TLDR
A novel steganalysis method based on Gaussian mixture models and mel-frequency cepstral coefficients was developed and tested for various overt/covert codec pairs in a single warden scenario with double transcoding and allowed for efficient detection of some codec pairs while some others remained more resistant to detection.
On the undetectability of transcoding steganography
TLDR
A wide analysis of different steganalysis methods is performed to assess the possibility of TranSteg detection and identify the most 'undetectable' pairs of voice codecs.
Pitch-based steganography for Speex voice codec
  • A. Janicki
  • Computer Science
    Secur. Commun. Networks
  • 2016
TLDR
The improved version of a steganographic algorithm for IP telephony based on approximating the F0 parameter, which is responsible for conveying information about the pitch of the speech signal, yielded a significantly lower decrease in speech quality, when compared with the original version of HideF0.
Evaluation of Efficiency of Transcoding Steganography
TLDR
This paper focuses on analyzing the efficiency of the recently proposed IP telephony information hiding method called transcoding steganography (TranSteg) that enables hidden communication with a high steganographic bandwidth while retaining good voice quality.
Novel Method of Hiding Information in IP Telephony Using Pitch Approximation
  • A. Janicki
  • Computer Science
    2015 10th International Conference on Availability, Reliability and Security
  • 2015
TLDR
It is determined that for Speex working in mode 5 the Hide F0 method can provide a hidden channel with a capacity of ca.
Pitch and Fourier magnitude based steganography for hiding 2.4 kbps MELP bitstream
TLDR
This work has dealt with the challenge of embedding a secret speech into a cover speech coded by a very low bit rate speech coder while maintaining a reasonable level of speech quality and was able to create hidden channels with maximum steganographic bandwidths up to 266.64 bit/s.
The Transfer of Hidden Information in Data in the AMR-WB Codec
TLDR
A steganographic channel was created with a capacity of up to 2500 b/s without damaging the voice quality significantly by deliberately damaging selected bits and a combination of them in a voice frame by an Adaptive Mode Rate Wide Band codec.
VoIP steganography and its Detection—A survey
TLDR
This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.
VoIP Steganography Methods, a Survey
TLDR
This paper focuses on data hiding methods that uses VoIP as a carrier and analyzes the performance of the algorithms using the three metrics undetectability, bandwidth and robustness.
...
...

References

SHOWING 1-10 OF 62 REFERENCES
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP
TLDR
This paper presents an adaptive steganography scheme that selects lower embedding bit rate in the flat segments, while the sharp segments can camouflage more secret message and can be used in real-time VoIP network with high hiding capacity.
Using transcoding for hidden communication in IP telephony
TLDR
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography), which aims to find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected.
Steganographic band width extension for the AMR codec of low-bit-rate modes
TLDR
The highband information is embedded into the pitch delay data of the AMR codec using an extended quantization-based method that achieves increased embedding capacity and higher perceived sound quality than the previous steganographic method.
An adaptive steganography scheme for voice over IP
TLDR
This paper presents an adaptive steganography scheme for VoIP that enhances the embedding transparency by taking into account the similarity between Least Significant Bits (LSBs) and embedded messages and introduces the notion of Partial Similarity Value (PSV).
An M-Sequence Based Steganography Model for Voice over IP
TLDR
A novelreal-time steganography model for VoIP that aims at providing good security for secret messages without sacrificing real-time performance by employing the well-known least-significant-bits (LSB) substitution approach to provide a reasonable tradeoff between the adequate information hiding requirement (good security and sufficient capacity) and the low latency requirement forVoIP.
Simple and effective speech steganography in G.723.1 low-rate codes
  • Tingting Xu, Zhen Yang
  • Computer Science
    2009 International Conference on Wireless Communications & Signal Processing
  • 2009
This paper presents a simple and effective steganography approach applied to 5.3 Kbps G.723.1 low-rate coded speech, based on analyzing the redundancy of coded parameters. Augmented identity matrix
A Technique of Lossless Steganography for G.711 Telephony Speech
  • N. Aoki
  • Computer Science
    2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
  • 2008
TLDR
The proposed technique exploits the characteristics of G.711 for embedding steganogram information without any degradation and the capacity of the proposed technique is shown.
Steganography of VoIP Streams
TLDR
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
LACK—a VoIP steganographic method
TLDR
The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’'s impact on quality of voice transmission and its resistance to steganalysis.
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set
TLDR
The overall objective of the paper is to evaluate existing audio steganography with a special focus on attacks in ad-hoc end-to-end media communications on the example of Voice over IP (VoIP) scenarios to understand operational requirements of recent steganographic techniques for VoIP applications.
...
...