Using transcoding for hidden communication in IP telephony
@article{Mazurczyk2012UsingTF, title={Using transcoding for hidden communication in IP telephony}, author={Wojciech Mazurczyk and Pawel Szaga and Krzysztof Szczypiorski}, journal={Multimedia Tools and Applications}, year={2012}, volume={70}, pages={2139-2165} }
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt data that is compressed to make space for the steganogram. The main innovation of TranSteg is to, for a chosen voice stream, find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected…
92 Citations
Steganalysis of transcoding steganography
- Computer ScienceAnn. des Télécommunications
- 2014
A novel steganalysis method based on Gaussian mixture models and mel-frequency cepstral coefficients was developed and tested for various overt/covert codec pairs in a single warden scenario with double transcoding and allowed for efficient detection of some codec pairs while some others remained more resistant to detection.
Using Signature for Hidden Communication Prevention in IP Telephony
- Computer Science
- 2015
This paper prevents the steganographic method for IP telephony called transcoding steganography (TranSteg), which detects the hidden communication between a VoIP call with signature-based scheme concept.
Influence of speech codecs selection on transcoding steganography
- Computer ScienceTelecommun. Syst.
- 2015
By considering the codecs which are currently most popular for IP telephony, this paper aims to find out which codecs should be chosen for transcoding to minimize the negative influence on voice quality while maximizing the obtained steganographic bandwidth.
An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography
- Computer ScienceIEEE Access
- 2019
The experimental results demonstrate that the proposed Steganographic algorithm can achieve relatively better IP speech data steganographic transparency and that it can outperform F5-WPC and SWPC approaches.
Pitch-based steganography for Speex voice codec
- Computer ScienceSecur. Commun. Networks
- 2016
The improved version of a steganographic algorithm for IP telephony based on approximating the F0 parameter, which is responsible for conveying information about the pitch of the speech signal, yielded a significantly lower decrease in speech quality, when compared with the original version of HideF0.
Frame-bitrate-change based steganography for voice-over-IP
- Computer Science
- 2014
A novel frame-bitrate-change based steganography is proposed, which discovers a novel covert channel for VoIP and introduces less distortion and fulfills the real-time requirement of VoIP communication.
Novel Method of Hiding Information in IP Telephony Using Pitch Approximation
- Computer Science2015 10th International Conference on Availability, Reliability and Security
- 2015
It is determined that for Speex working in mode 5 the Hide F0 method can provide a hidden channel with a capacity of ca.
A High-Capacity Covering Code for Voice-Over-IP Steganography
- Computer ScienceInt. J. Inf. Technol. Web Eng.
- 2015
The experimental results show that the authors' scheme can provide good performance on both steganographic transparency and embedding capacity, and achieve better balance between the two objectives than the existing ones.
Covert Channel in RTP Payload Using a Pointer in Sip Header
- Computer ScienceCommunications - Scientific letters of the University of Zilina
- 2016
The creation of covert communication channels is the subject addressed by the scientific branch referred to as steganography the results of which can also be applied in IP telephony, using protocols applied across the Internet network.
References
SHOWING 1-10 OF 66 REFERENCES
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP
- Computer Science2011 IEEE International Conference on Communications (ICC)
- 2011
This paper presents an adaptive steganography scheme that selects lower embedding bit rate in the flat segments, while the sharp segments can camouflage more secret message and can be used in real-time VoIP network with high hiding capacity.
An adaptive steganography scheme for voice over IP
- Computer Science2009 IEEE International Symposium on Circuits and Systems
- 2009
This paper presents an adaptive steganography scheme for VoIP that enhances the embedding transparency by taking into account the similarity between Least Significant Bits (LSBs) and embedded messages and introduces the notion of Partial Similarity Value (PSV).
Lost audio packets steganography: the first practical evaluation
- Computer ScienceSecur. Commun. Networks
- 2012
First experimental results for an Internet Protocol (IP) telephony-based steganographic method called lost audio packets steganography (LACK) are presented and the method’s impact on the quality of voice transmission is shown.
Steganography of VoIP Streams
- Computer ScienceOTM Conferences
- 2008
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
An M-Sequence Based Steganography Model for Voice over IP
- Computer Science2009 IEEE International Conference on Communications
- 2009
A novelreal-time steganography model for VoIP that aims at providing good security for secret messages without sacrificing real-time performance by employing the well-known least-significant-bits (LSB) substitution approach to provide a reasonable tradeoff between the adequate information hiding requirement (good security and sufficient capacity) and the low latency requirement forVoIP.
ReLACK: A Reliable VoIP Steganography Approach
- Computer Science2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
- 2011
This paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange's Interpolation, and applies a two phase approach on the LACK steganography mechanism to provide reliability and fault tolerance and to increase steganalysis complexity.
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec
- Computer ScienceIEEE Transactions on Information Forensics and Security
- 2011
It is revealed that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the streams; that is, steganography in the inactive audio frames attains a largerData embedding capacity than that in the active audio frames under the same imperceptibility.
Design and evaluation of steganography for voice-over-IP
- Computer Science2006 IEEE International Symposium on Circuits and Systems
- 2006
It is shown that using this framework it is largely secure to transmit hidden messages during a VoIP session and demonstrate results with respect to perceptibility for music and speech data.
Information Hiding in Real-Time VoIP Streams
- Computer ScienceNinth IEEE International Symposium on Multimedia (ISM 2007)
- 2007
This paper proposes a novel design of real-time speech hiding for G.711 codec, which is widely supported by almost every VoIP device and shows that the processing time for the proposed algorithm takes only 0.257 ms, suitable for real- time VoIP applications.
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set
- Computer ScienceIS&T/SPIE Electronic Imaging
- 2005
The overall objective of the paper is to evaluate existing audio steganography with a special focus on attacks in ad-hoc end-to-end media communications on the example of Voice over IP (VoIP) scenarios to understand operational requirements of recent steganographic techniques for VoIP applications.