用户名: 密码: 验证码:
Covert voice over internet protocol communications based on spatial model
详细信息    查看全文
  • 作者:YongFeng Huang ; ShanYu Tang
  • 关键词:covert communication ; multimedia networking ; VoIP ; data security
  • 刊名:SCIENCE CHINA Technological Sciences
  • 出版年:2016
  • 出版时间:January 2016
  • 年:2016
  • 卷:59
  • 期:1
  • 页码:117-127
  • 全文大小:635 KB
  • 参考文献:1.Zander S, Armitage G, Branch P. Covert channels and countermeasures in computer network protocols. IEEE Commun Mag, 2007, 45: 136–142CrossRef
    2.Luo X, Chan E W W, Chang R K C. TCP covert timing channels: Design and detection. In: Proc. of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Anchorage, Alaska, 2008. 420–429
    3.Sellke S H, Wang C, Bagchi S, et al. TCP/IP timing channels: Theory to implementation. In: Proc. of 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, 2009. 2204–2212
    4.Bai L Y, Huang Y, Hou G, et al. Covert channels based on Jitter field of the RTCP header. In: Proc. of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 1388–1391
    5.Huang Y, Xiao B, Xiao H. Implementation of covert communication based on steganography. In: Proc. of 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 1512–1515
    6.Aoki N. A technique of lossless steganography for G.711 telephony speech. In: Proc. of Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 608–611
    7.Su Y, Huang Y, Li X. Steganography-oriented noisy resistance model of G.729a. In: Proc. of 2006 IMACS Multi-conference on Computational Engineering in Systems Applications, Beijing, China, 2006. 11–15
    8.Liu L, Li M, Li Q, et al. Perceptually transparent information hiding in G.729 bitstream. In: Proc. of 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 406–409
    9.Xiao B, Huang Y, Tang S. An approach to information hiding in low bit-rate speech stream. In: Proc. of IEEE Global Telecommunications, USA, 2008. 371–375
    10.Mazurczyk W, Lubacz J. LACKa VoIP steganographic method. Telecommun Syst J, 2010, 45: 153–163CrossRef
    11.Lubacz J, Mazurczyk W, Szczypiorski K. Principles and overview of network steganography. IEEE Commun Mag, 2014, 52, 225–229CrossRef
    12.Druid. Real-time steganography with RTP. http://​druid.​caughq.​org, 01 December 2011
    13.Kratzer C, Dittmann J, Vogel T, et al. Design and evaluation of steganography for Voice-over-IP. In: Proc. of 2006 IEEE International Symposium on Circuits and Systems, Island of Kos, Greece, 2006. 2397–2340
    14.Cachin C. An information-theoretic model for steganography. Inform Comput, 2004, 192: 41–56MathSciNet CrossRef MATH
    15.Bo X, Huang Y F. Reliable transmission of information hiding communication over stream-media. J Xidian Univ, 2008, 35: 554–558
    16.Mazurczyk W, Kotulski Z. Covert channel for improving VoIP security. In: Proc. of 2006 Multi-conference on Advanced Computer Systems, Międzyzdroje, Poland, 2006. 311–320
    17.Wang C, Wu Q. Information hiding in real-time VoIP streams. In: Proc. of 9th IEEE International Symposium on Multimedia, Taichung, Taiwan, 2007. 255–262
    18.Huang Y F, Tang S, Yuan J. Steganography in inactive frames of VoIP streams encoded by source codec. IEEE T Inform Forensics Secur, 2011, 6: 296–306CrossRef
    19.Li X, Yang B, Cheng D, et al. A generalization of LSB matching. IEEE Signal Proc Let, 2009, 16: 69–72CrossRef
    20.Aoki N. A band extension technique for G.711 speech using steganography. IEICE T Commun, 2006, 89: 1896–1898CrossRef
    21.Huang Y, Tang S, Bao C, et al. Steganalysis of compressed speech to detect covert voice over Internet protocol channels. IET Inform Secur, 2011, 5: 26–32CrossRef
    22.Huang Y, Tang S, Zhang Y. Detection of covert voice over Internet protocol communications using sliding window-based steganalysis. IET Commun, 2011, 5: 929–936CrossRef
    23.Huang Y F, Yuan J, Chen M C. Key distribution in the covert communication based on VoIP. Chinese J Electron, 2011, 20: 357–361
    24.Liu Q Z, Sung A H, Qiao M Y. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE T Inform Forensics Secur, 2009, 4: 359–368CrossRef
  • 作者单位:YongFeng Huang (1) (2)
    ShanYu Tang (3) (4)

    1. Department of Electronic Engineering, Tsinghua University, Beijing, 100084, China
    2. Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing, 100084, China
    3. School of Computer Science, China University of Geosciences, Wuhan, 430074, China
    4. Department of Computing, London Metropolitan University, London, N7 8DB, UK
  • 刊物类别:Engineering
  • 刊物主题:Chinese Library of Science
    Engineering, general
  • 出版者:Science China Press, co-published with Springer
  • ISSN:1869-1900
文摘
This paper presents a new spatial steganography model for covert communications over voice over internet protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert VoIP communications. By taking into account the variation characteristics of VoIP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on VoIP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of VoIP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert VoIP communications.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700