Steganalysis of transcoding steganography

@article{Janicki2014SteganalysisOT,
  title={Steganalysis of transcoding steganography},
  author={Artur Janicki and Wojciech Mazurczyk and Krzysztof Szczypiorski},
  journal={annals of telecommunications - annales des t{\'e}l{\'e}communications},
  year={2014},
  volume={69},
  pages={449-460}
}
Transcoding steganography (TranSteg) is a fairly new IP telephony steganographic method that functions by compressing overt (voice) data to make space for the steganogram by means of transcoding. [] Key Method A novel steganalysis method based on Gaussian mixture models and mel-frequency cepstral coefficients was developed and tested for various overt/covert codec pairs in a single warden scenario with double transcoding. The proposed method allowed for efficient detection of some codec pairs (e.g., G.711/G…
On the undetectability of transcoding steganography
TLDR
A wide analysis of different steganalysis methods is performed to assess the possibility of TranSteg detection and identify the most 'undetectable' pairs of voice codecs.
Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate
TLDR
The experimental results demonstrate that all the three steganalysis schemes are feasible and effective for detecting the existing steganographic methods with unknown embedding rates in AMR speech streams, while the DST-based scheme outperforms the others overall.
Pitch-based steganography for Speex voice codec
  • A. Janicki
  • Computer Science
    Secur. Commun. Networks
  • 2016
TLDR
The improved version of a steganographic algorithm for IP telephony based on approximating the F0 parameter, which is responsible for conveying information about the pitch of the speech signal, yielded a significantly lower decrease in speech quality, when compared with the original version of HideF0.
Steganography and Steganalysis in Voice over IP: A Review
TLDR
Recent research results of steganography and steganalysis based on protocol and voice payload are classified and summarized and the paper also summarizes their characteristics, advantages, and disadvantages.
A Model for the Effective Steganalysis of VoIP
TLDR
This work proposes an effective steganalysis method which considers the speech behavior as well as network protocol structure to detect hidden communication in voice over IP (VoIP).
Pitch and Fourier magnitude based steganography for hiding 2.4 kbps MELP bitstream
TLDR
This work has dealt with the challenge of embedding a secret speech into a cover speech coded by a very low bit rate speech coder while maintaining a reasonable level of speech quality and was able to create hidden channels with maximum steganographic bandwidths up to 266.64 bit/s.
VoIP steganography and its Detection—A survey
TLDR
This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.
Audio steganalysis using deep belief networks
TLDR
A new steganalysis method that uses a deep belief network (DBN) as a classifier for audio files and shows that it gives higher classification rates than the two other Steganalysis methods based on SVMs and GMMs.
Steganalysis of Adaptive Multi-Rate Speech Based on Extreme Gradient Boosting
TLDR
A novel AMR steganalysis model is presented, which utilizes extreme gradient boosting (XGBoost) as the classifier, instead of support vector machines (SVM) adopted in the previous schemes, which can facilitate the excavation of potential information from the high-dimensional features and can avoid overfitting.
...
...

References

SHOWING 1-10 OF 46 REFERENCES
Using transcoding for hidden communication in IP telephony
TLDR
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography), which aims to find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected.
Mel-cepstrum-based steganalysis for VoIP steganography
TLDR
This paper introduces a Mel-cepstrum based analysis known from speaker and speech recognition to perform a detection of embedded hidden messages and shows how general forensic approaches can detect information hiding techniques in the field of hidden communication as well as for DRM applications.
Influence of speech codecs selection on transcoding steganography
TLDR
By considering the codecs which are currently most popular for IP telephony, this paper aims to find out which codecs should be chosen for transcoding to minimize the negative influence on voice quality while maximizing the obtained steganographic bandwidth.
Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification
TLDR
The applied trained detector approach, using a SVM (support vector machine) based classification on feature sets generated by fusion of time domain and Mel-cepstral domain features, is evaluated for its quality as a universal steganalysis tool as well as a application specific steganization tool for VoIP steganography.
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set
TLDR
The overall objective of the paper is to evaluate existing audio steganography with a special focus on attacks in ad-hoc end-to-end media communications on the example of Voice over IP (VoIP) scenarios to understand operational requirements of recent steganographic techniques for VoIP applications.
Steganalysis of compressed speech to detect covert voice over Internet protocol channels
TLDR
Experimental results have proven the effectiveness of the steganalysis method for detecting the covert channel in the compressed VoIP speech and accurately estimate the embedded message length.
Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches
TLDR
It is shown that the newly implemented frequency domain features increase the classification accuracy achieved in SVM classification and it is shown on the example of VoIP steganalysis that channel character specific evaluation performs better than tests without focus on a specific channel.
Eliminating Steganography in Internet Traffic with Active Wardens
TLDR
This paper examines the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall, and introduces the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications.
Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis
TLDR
Experimental analysis reveals that the proposed method improves the detection time significantly, utilising less memory resources for VoIP steganalysis, thereby enabling real-time detection of stego VoIP streams.
Covert channel detection in VoIP streams
This paper presents two approaches to detect VoIP covert channel communications using compressed versions of the data packets. The approach is based on specialized random projection matrices that
...
...