Using transcoding for hidden communication in IP telephony

@article{Mazurczyk2012UsingTF,
  title={Using transcoding for hidden communication in IP telephony},
  author={Wojciech Mazurczyk and Pawel Szaga and Krzysztof Szczypiorski},
  journal={Multimedia Tools and Applications},
  year={2012},
  volume={70},
  pages={2139-2165}
}
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt data that is compressed to make space for the steganogram. The main innovation of TranSteg is to, for a chosen voice stream, find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected… 
Steganalysis of transcoding steganography
TLDR
A novel steganalysis method based on Gaussian mixture models and mel-frequency cepstral coefficients was developed and tested for various overt/covert codec pairs in a single warden scenario with double transcoding and allowed for efficient detection of some codec pairs while some others remained more resistant to detection.
Using Signature for Hidden Communication Prevention in IP Telephony
TLDR
This paper prevents the steganographic method for IP telephony called transcoding steganography (TranSteg), which detects the hidden communication between a VoIP call with signature-based scheme concept.
Influence of speech codecs selection on transcoding steganography
TLDR
By considering the codecs which are currently most popular for IP telephony, this paper aims to find out which codecs should be chosen for transcoding to minimize the negative influence on voice quality while maximizing the obtained steganographic bandwidth.
An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography
TLDR
The experimental results demonstrate that the proposed Steganographic algorithm can achieve relatively better IP speech data steganographic transparency and that it can outperform F5-WPC and SWPC approaches.
Pitch-based steganography for Speex voice codec
  • A. Janicki
  • Computer Science
    Secur. Commun. Networks
  • 2016
TLDR
The improved version of a steganographic algorithm for IP telephony based on approximating the F0 parameter, which is responsible for conveying information about the pitch of the speech signal, yielded a significantly lower decrease in speech quality, when compared with the original version of HideF0.
Frame-bitrate-change based steganography for voice-over-IP
TLDR
A novel frame-bitrate-change based steganography is proposed, which discovers a novel covert channel for VoIP and introduces less distortion and fulfills the real-time requirement of VoIP communication.
Novel Method of Hiding Information in IP Telephony Using Pitch Approximation
  • A. Janicki
  • Computer Science
    2015 10th International Conference on Availability, Reliability and Security
  • 2015
TLDR
It is determined that for Speex working in mode 5 the Hide F0 method can provide a hidden channel with a capacity of ca.
Optimal matrix embedding for Voice-over-IP steganography
A High-Capacity Covering Code for Voice-Over-IP Steganography
TLDR
The experimental results show that the authors' scheme can provide good performance on both steganographic transparency and embedding capacity, and achieve better balance between the two objectives than the existing ones.
Covert Channel in RTP Payload Using a Pointer in Sip Header
TLDR
The creation of covert communication channels is the subject addressed by the scientific branch referred to as steganography the results of which can also be applied in IP telephony, using protocols applied across the Internet network.
...
...

References

SHOWING 1-10 OF 66 REFERENCES
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP
TLDR
This paper presents an adaptive steganography scheme that selects lower embedding bit rate in the flat segments, while the sharp segments can camouflage more secret message and can be used in real-time VoIP network with high hiding capacity.
An adaptive steganography scheme for voice over IP
TLDR
This paper presents an adaptive steganography scheme for VoIP that enhances the embedding transparency by taking into account the similarity between Least Significant Bits (LSBs) and embedded messages and introduces the notion of Partial Similarity Value (PSV).
Lost audio packets steganography: the first practical evaluation
TLDR
First experimental results for an Internet Protocol (IP) telephony-based steganographic method called lost audio packets steganography (LACK) are presented and the method’s impact on the quality of voice transmission is shown.
Steganography of VoIP Streams
TLDR
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
An M-Sequence Based Steganography Model for Voice over IP
TLDR
A novelreal-time steganography model for VoIP that aims at providing good security for secret messages without sacrificing real-time performance by employing the well-known least-significant-bits (LSB) substitution approach to provide a reasonable tradeoff between the adequate information hiding requirement (good security and sufficient capacity) and the low latency requirement forVoIP.
ReLACK: A Reliable VoIP Steganography Approach
  • Mohammad Hamdaqa, L. Tahvildari
  • Computer Science
    2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
  • 2011
TLDR
This paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange's Interpolation, and applies a two phase approach on the LACK steganography mechanism to provide reliability and fault tolerance and to increase steganalysis complexity.
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec
TLDR
It is revealed that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the streams; that is, steganography in the inactive audio frames attains a largerData embedding capacity than that in the active audio frames under the same imperceptibility.
Design and evaluation of steganography for voice-over-IP
TLDR
It is shown that using this framework it is largely secure to transmit hidden messages during a VoIP session and demonstrate results with respect to perceptibility for music and speech data.
Information Hiding in Real-Time VoIP Streams
TLDR
This paper proposes a novel design of real-time speech hiding for G.711 codec, which is widely supported by almost every VoIP device and shows that the processing time for the proposed algorithm takes only 0.257 ms, suitable for real- time VoIP applications.
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set
TLDR
The overall objective of the paper is to evaluate existing audio steganography with a special focus on attacks in ad-hoc end-to-end media communications on the example of Voice over IP (VoIP) scenarios to understand operational requirements of recent steganographic techniques for VoIP applications.
...
...