Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec

@article{Huang2011SteganographyII,
  title={Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec},
  author={Yongfeng Huang and Shanyu Tang and Jian Yuan},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2011},
  volume={6},
  pages={296-306}
}
This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which is used extensively in Voice over Internet Protocol (VoIP). This study reveals that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the streams; that is, steganography in the inactive audio frames attains a larger data embedding capacity… 

Secure steganography in audio using inactive frames of VoIP streams

TLDR
To enhance security in steganography PCC (Parabolic Curve Cryptography) algorithm is implemented and is used for detecting inactive frames of low bit rate audio streams.

Frame-bitrate-change based steganography for voice-over-IP

TLDR
A novel frame-bitrate-change based steganography is proposed, which discovers a novel covert channel for VoIP and introduces less distortion and fulfills the real-time requirement of VoIP communication.

Steganography Integration Into a Low-Bit Rate Speech Codec

TLDR
A new algorithm is proposed for steganography in low bit-rate VoIP audio streams by integrating information hiding into the process of speech encoding, thus maintaining synchronization between information hiding and speech encoding.

A Synchronization Scheme for Hiding Information in Encoded Bitstream of Inactive Speech Signal

  • R. Lin
  • Computer Science
    J. Inf. Hiding Multim. Signal Process.
  • 2016
TLDR
Experimental results show that the proposed high-capacity hiding algorithm not only achieves perfect imperceptibility but also produces a high data-embedding capacity, up to 2128 bits per second.

Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency

TLDR
The proposed steganalysis method can provide accurate detecting results for the existing steganographic methods only using very small quantity of inactive frames, and thereby be employed to detecting potential inactive-frame steganography behaviors in real-time speech streams.

Advanced Integrated Steganographic Approach With VOIP Communication

TLDR
This paper focus is on improving the data embedding capacity of steganography in low bit rate audio streams encoded by G711 source codec and to overcome the packet loss during the integration of hidden messages.

Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test

TLDR
Both theoretical and experimental analyses demonstrate that the distribution of 0 and 1 in encoding parameter bits becomes symmetric after a steganographic process, which affects the frequency of each subsequence of parameter bits, and accordingly changes the poker test statistical features of encode parameter bits.

Universal steganography model for low bit-rate speech codec

TLDR
A universal VoIP steganography model is proposed that uses the PESQ deterioration rate and the decoding error to automatically choose a data-embedding algorithm for each VoIP bitstream, which enables ones to achieve covert communications using a low bit-rate speech codec efficiently and securely.

Encrypting and Disentangling Secret Data in . wav

TLDR
The methodology that be used in applications such as VolP, streaming audio, archival and messaging, and to enhance security in steganography PCC (Parabolic Curve Cryptography) algorithm is introduced.

Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys

TLDR
The proposed QIM-controlled steganographic algorithm was more secure and robust than the QIM algorithm, the conventional RANDOM algorithm and the original codebook algorithm, and can minimize signal distortion while steganography taking place.
...

References

SHOWING 1-10 OF 20 REFERENCES

Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set

TLDR
The overall objective of the paper is to evaluate existing audio steganography with a special focus on attacks in ad-hoc end-to-end media communications on the example of Voice over IP (VoIP) scenarios to understand operational requirements of recent steganographic techniques for VoIP applications.

A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP

TLDR
A covert communication model based on least significant bits (LSB) steganography in Voice over IP (VoIP) aimed at providing nice security of secret messages and real-time performance that is vital for VoIP.

Approach to Hide Secret Speech Information in G.721 Scheme

TLDR
The experiments show that this approach meets the requirements of information hiding, satisfies the constraints of speech quality for secure communication, and achieves high hiding capacity of 1.6Kbps with an excellent speech quality and complicating speakers' recognition.

An Approach to Information Hiding in Low Bit-Rate Speech Stream

TLDR
This is the first work adopting graph theory to improve the codebook partition while using QIM in low bit-rate streaming media and guarantees that every codeword is in the opposite part to its nearest neighbor, and the distortion is limited by a bound.

G.711-Based Adaptive Speech Information Hiding Approach

TLDR
An adaptive LSB algorithm to embed dynamic secret speech information data bits into public speech of G.711-PCM (Pulse Code Modulation) for the purpose of secure communication according to energy distribution, with high efficiency in steganography and good quality in output speech.

LPC parameters substitution for speech information hiding

Dither-like data hiding in multistage vector quantization of MELP and G.729 speech coding

  • P. ChangHsin-Min Yu
  • Computer Science
    Conference Record of the Thirty-Sixth Asilomar Conference on Signals, Systems and Computers, 2002.
  • 2002
We present a speech data hiding technique that utilizes the characteristics of multistage vector quantization (MSVQ) and subtractive dithering to maintain high speech reconstruction quality. The last

A Technique of Lossless Steganography for G.711 Telephony Speech

  • N. Aoki
  • Computer Science
    2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
  • 2008
TLDR
The proposed technique exploits the characteristics of G.711 for embedding steganogram information without any degradation and the capacity of the proposed technique is shown.

Design and evaluation of steganography for voice-over-IP

TLDR
It is shown that using this framework it is largely secure to transmit hidden messages during a VoIP session and demonstrate results with respect to perceptibility for music and speech data.

Steganalysis of Compressed Speech

TLDR
A novel approach to detect hiding information by using the statistical value of increaser entropy and can not only detect hidden messages embedded in compressed speech, but also estimate the embedded message length accurately.