Frame-bitrate-change based steganography for voice-over-IP

Jin Liu , Hui Tian , Ke Zhou

Journal of Central South University ›› 2014, Vol. 21 ›› Issue (12) : 4544 -4552.

PDF
Journal of Central South University ›› 2014, Vol. 21 ›› Issue (12) : 4544 -4552. DOI: 10.1007/s11771-014-2459-5
Article

Frame-bitrate-change based steganography for voice-over-IP

Author information +
History +
PDF

Abstract

Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP (VoIP). However, direct modification on frames is often independent of the inherent speech features, which may lead to great degradation of speech quality. A novel frame-bitrate-change based steganography is proposed in this work, which discovers a novel covert channel for VoIP and introduces less distortion. This method exploits the feature of multi-rate speech codecs that the practical bitrate of speech frame is identified only by speech decoder at receiving end. Based on this characteristic, two steganography strategies called bitrate downgrading (BD) and bitrate switching (BS) are provided. The first strategy substitutes high bit-rate speech frames with lower ones to embed secret message, which introduces very low distortion in practice, and much less than other bits-modification based methods with the same embedding capacity. The second one encodes secret message bits into different types of speech frames, which is an alternative choice for supplement. The two strategies are implemented and tested on our covert communication system StegVoIP. The experiment results show that our proposed method is effective and fulfills the real-time requirement of VoIP communication.

Keywords

covert communication / steganography / multi-rate speech codec / voice-over-IP (VOIP)

Cite this article

Download citation ▾
Jin Liu, Hui Tian, Ke Zhou. Frame-bitrate-change based steganography for voice-over-IP. Journal of Central South University, 2014, 21(12): 4544-4552 DOI:10.1007/s11771-014-2459-5

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

KeromytisA. Voice-over-IP security: Research and practice [J]. IEEE Security Privacy, 2010, 8(2): 76-78

[2]

TianH, ZhouK, FengDan. Dynamic matrix encoding strategy for voice-over-IP steganography [J]. Journal of Central South University of Technology, 2010, 17(6): 1285-1292

[3]

YingL-z, HuangY-f, YuanJ, LindaB. A novel covert timing channel based on RTP/RTCP [J]. Chinese Journal of Electronics, 2012, 21(4): 711-714

[4]

ZhouK, LiuJ, TianH, LiC-hua. State-based steganography in low bit rate speech [C]. Proceedings of the 20th ACM International Conference on Multimedia, 2012, Nara, ACM: 1109-1112

[5]

HuangY, TangS, BaoC. Steganalysis of compressed speech to detect covert voice over Internet protocol channels [J]. IET Information Security, 2011, 5(1): 26-32

[6]

ZanderS, ArmitageG, BranchP. Covert channels and countermeasures in computer network protocols [J]. IEEE Communications Magazine, 2007, 45(12): 136-142

[7]

TianH, JiangH, ZhouK, DanFeng. Transparency-orientated encoding strategies for voice-over-IP steganography [J]. The Computer Journal, 2012, 55(6): 702-716

[8]

TianH, ZhouK, LuJing. A VoIP-based covert communication scheme using compounded pseudorandom m sequence [J]. International Journal of Advancements in Computing Technology, 2012, 4(1): 223-230

[9]

LiuJ, ZhouK, TianH, LiC-hua. Efficient least-significant-bits steganography for VoIP [J]. International Journal of Advancements in Computing Technology, 2012, 4(10): 297-305

[10]

HuangY, TangS, YuanJ. Steganography in inactive frames of VoIP streams encoded by source codec [J]. IEEE Transactions on Information Forensics and Security, 2011, 6(2): 296-306

[11]

MazurczykW, SzagaP, SzczypiorskiK. Using transcoding for hidden communication in IP telephony [J]. Multimedia Tools and Applications, 20111-27

[12]

Telecommunication standardization sector of ITU.ITU-T G.723.1-Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s [R], 2006, Geneva, Switzerland, International Telecommunication Union

[13]

SimmonsG. The prisoner’s problem and the subliminal channel [C]. Proceedings of Crypto: Plenum, 198451-67

[14]

SchulzrinneH, CasnerS. RTP profile for audio and video conferences with minimal control [R]. IETF Network Working Group, 2003

[15]

XiaoB, HuangY-feng. Modeling and optimizing of the information hiding communication system over streaming media [J]. Journal of Xidian University, 2008, 353: 554-558

[16]

WangC, WuQuincy. Information hiding in real-time VoIP streams [C]. Proceedings of the 9th IEEE International Symposium on Multimedia, 2007, Taiwan, IEEE: 255-262

[17]

NORVIG P. English letter frequency counts: Mayzner revisited [EB/OL]. [2012-12-20]. http://norvig.com/mayzner.html.

[18]

Telecommunication standardization sector of ITU.ITU-T P.862-Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs [R], 2001, Geneva, Switzerland, International Telecommunication Union

[19]

Telecommunication standardization sector of ITU.ITU-T G.114-One-way transmission time [R], 2003, Geneva, Switzerland, International Telecommunication Union

[20]

LuJ-c, HuangY-f, LiuF-l, LuoX-yang. Pulse position checking-based steganalysis of G.723.1 compressed speech in VoIP [J]. International Journal Multimedia Intelligence and Security, 2011, 2(3/4): 225-237

[21]

LiS-b, TaoH-z, HuangY-feng. Detection of QIM steganography in G.723.1 bit stream based on quantization index sequence analysis [J]. Journal of Zhejiang University Science C, 2012, 13(8): 624-634

AI Summary AI Mindmap
PDF

321

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/