Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set

@inproceedings{Dittmann2005SteganographyAS,
  title={Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set},
  author={Jana Dittmann and Danny Hesse and Reyk Hillert},
  booktitle={IS\&T/SPIE Electronic Imaging},
  year={2005}
}
Based on the knowledge and experiences from existing image steganalysis techniques, the overall objective of the paper is to evaluate existing audio steganography with a special focus on attacks in ad-hoc end-to-end media communications on the example of Voice over IP (VoIP) scenarios. One aspect is to understand operational requirements of recent steganographic techniques for VoIP applications. The other aspect is to elaborate possible steganalysis approaches applied to speech data. In… 

A novel steganography approach for voice over IP

AVIS, a novel Adaptive VoIP steganography approach to hide information within network audio streams, is proposed and experimental results demonstrate that this approach provides better performance than the traditional one.

Mel-cepstrum-based steganalysis for VoIP steganography

This paper introduces a Mel-cepstrum based analysis known from speaker and speech recognition to perform a detection of embedded hidden messages and shows how general forensic approaches can detect information hiding techniques in the field of hidden communication as well as for DRM applications.

Steganalysis of transcoding steganography

A novel steganalysis method based on Gaussian mixture models and mel-frequency cepstral coefficients was developed and tested for various overt/covert codec pairs in a single warden scenario with double transcoding and allowed for efficient detection of some codec pairs while some others remained more resistant to detection.

Adaptive partial-matching steganography for voice over IP using triple M sequences

A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP

A covert communication model based on least significant bits (LSB) steganography in Voice over IP (VoIP) aimed at providing nice security of secret messages and real-time performance that is vital for VoIP.

Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication

The theoretical analysis of steganographic security using information theory proves that the proposed model for covertVoIP communications is secure against a passive adversary, and is more secure and effective at improving the security of covert VoIP communications than the other related algorithms with the comparable data embedding rates.

Steganalysis of compressed speech to detect covert voice over Internet protocol channels

Experimental results have proven the effectiveness of the steganalysis method for detecting the covert channel in the compressed VoIP speech and accurately estimate the embedded message length.

An adaptive steganography scheme for voice over IP

This paper presents an adaptive steganography scheme for VoIP that enhances the embedding transparency by taking into account the similarity between Least Significant Bits (LSBs) and embedded messages and introduces the notion of Partial Similarity Value (PSV).

Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches

It is shown that the newly implemented frequency domain features increase the classification accuracy achieved in SVM classification and it is shown on the example of VoIP steganalysis that channel character specific evaluation performs better than tests without focus on a specific channel.

A Model for the Effective Steganalysis of VoIP

This work proposes an effective steganalysis method which considers the speech behavior as well as network protocol structure to detect hidden communication in voice over IP (VoIP).
...