Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1631272.1631412acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
short-paper

Digital logic based encoding strategies for steganography on voice-over-IP

Published: 19 October 2009 Publication History
  • Get Citation Alerts
  • Abstract

    This paper presents three encoding strategies based on digital logic for steganography on Voice over IP (VoIP), which aim to enhance the embedding transparency. Differing from previous approaches, our strategies reduce the embedding distortion by improving the similarity between the cover and the covert message using digital logical transformations, instead of reducing the amount of the substitution bits. Therefore, by contrast, our strategies will improve the embedding transparency without sacrificing the embedding capacity. Of these three strategies, the first one adopts logical operations, the second one employs circular shifting operations, and the third one combines the operations of the first two. All of them are evaluated through comparing their prototype implementations with some existing methods in a prototypical covert communication system based on VoIP (called StegVoIP). The experimental results show that the proposed strategies can effectively enhance the embedding transparency while maintaining the maximum embedding capacity.

    References

    [1]
    N. Provos, P. Honeyman. Hide and seek: an introduction to steganography, IEEE Security&Privacy Magazine, Vol. 1, Issue 3, May-June 2003, pp. 32--44.
    [2]
    K. Bailey, K. Curran. An evaluation of image based steganography methods. Multimedia Tools and Applications, Vol. 30, Issue 1, July 2006, pp. 55--88.
    [3]
    E. T. Lin, A. M. Eskicioglu, etc. Advances in digital video content protection, Proceedings of the IEEE: Special Issue on Advances in Video Coding and Delivery, Vol.93, No.1, January 2005, pp.171--183.
    [4]
    M. Shirali-Shahreza. "A new method for real-time steganography", Proceedings of the 8th International Conference on Signal Processing, Vol. 4, pp. 16--20, 2006.
    [5]
    B. Goode. Voice over Internet protocol (VoIP), Proceedings of the IEEE, Vol. 90, Issue 9, Sept. 2002, pp. 1495--1517.
    [6]
    C. Wang, Q. Wu. Information hiding in real-time VoIP streams, Proceedings of the 9th IEEE International Symposium on Multimedia, 10--12 Dec. 2007, pp. 255--262.
    [7]
    J. Dittmann, D. Hesse and R. Hillert. Steganography and steganalysis in voice over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, Proceedings of SPIE, Vol. 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, March 2005, pp. 607--618.
    [8]
    C. Kratzer, J. Dittmann, T. Vogel, and R. Hillert. Design and evaluation of steganography for voice-over-IP, Proceedings of 2006 IEEE International Symposium on Circuits and Systems, 21--24 May 2006, pp. 2397--2340.
    [9]
    Y. Huang, B. Xiao, H. Xiao. Implementation of Covert Communication Based on Steganography. In Proceedings of 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Aug. 2008, pp. 1512 -- 1515.
    [10]
    H. Tian, K. Zhou, Y. Huang, etc. A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP. In Proceedings of the 9th International Conference for Young Computer Scientists, Nov. 2008, pp.647--652.
    [11]
    H. Tian, K. Zhou, H. Jiang, etc. An Adaptive Steganography Scheme for Voice over IP. In Proceedings of the 2009 IEEE International Symposium on Circuits and Systems, Taipei, Taiwan, May 24--27, 2009, pp. 2922--2925.
    [12]
    H. Tian, K. Zhou, H. Jiang, etc. An M-Sequence Based Steganography Model for Voice over IP. In Proceedings of the 2009 IEEE International Conference on Communications, Dresden, Germany, June 14--18, 2009.
    [13]
    S. Engelberg, H. Benjamin. Pseudorandom sequences and the measurement of the frequency response. IEEE Instrumentation&Measurement Magazine, Vol. 8, Issue 1, Mar. 2005, pp. 54 --59.
    [14]
    A. Tefas, A. Nikolaidis, N. Nikolaidis, etc. Statistical Analysis of Markov Chaotic Sequences for Watermarking Applications. In Proceedings of the 2001 IEEE International Symposium on Circuits and Systems, May 6--9,2001 pp.57--60
    [15]
    G. Voyatzis, I. Pitas. Applications of toral automorphisms in image watermarking. In Proceedings of the IEEE 1996 International Conference on Image Processing, Sept.16--19, 1996, pp. 237 -- 240
    [16]
    S. J. Murdoch, S. Lewis. Embedding Covert Channels into TCP/IP. Proceedings of the 7th Information Hiding workshop, June, 2005, pp. 247--262.
    [17]
    K. Ahsan and D. Kundur. Practical data hiding in TCP/IP. Proceedings of the Workshop on Multimedia Security at ACM Multimedia, Dec, 2002. pp. 63--70.
    [18]
    ITU-T Recommendation P. 862. Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs, Feb. 2001.
    [19]
    ITU-T Recommendation P. 800. Methods for subjective determination of transmission quality, Aug. 1996.
    [20]
    Available at: http://www.acmmm09.org/ACMMM09_CFP.pdf.

    Cited By

    View all
    • (2022)Few-shot Text Steganalysis Based on Attentional Meta-learnerProceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security10.1145/3531536.3532949(97-106)Online publication date: 23-Jun-2022
    • (2016)Pitch-based steganography for Speex voice codecSecurity and Communication Networks10.1002/sec.14289:15(2923-2933)Online publication date: 1-Oct-2016
    • (2013)A novel steganography approach for voice over IPJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-013-0212-95:4(601-610)Online publication date: 17-Dec-2013
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM '09: Proceedings of the 17th ACM international conference on Multimedia
    October 2009
    1202 pages
    ISBN:9781605586083
    DOI:10.1145/1631272
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 October 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. VoIP
    2. digital logic
    3. steganography
    4. transparency

    Qualifiers

    • Short-paper

    Conference

    MM09
    Sponsor:
    MM09: ACM Multimedia Conference
    October 19 - 24, 2009
    Beijing, China

    Acceptance Rates

    Overall Acceptance Rate 995 of 4,171 submissions, 24%

    Upcoming Conference

    MM '24
    The 32nd ACM International Conference on Multimedia
    October 28 - November 1, 2024
    Melbourne , VIC , Australia

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Few-shot Text Steganalysis Based on Attentional Meta-learnerProceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security10.1145/3531536.3532949(97-106)Online publication date: 23-Jun-2022
    • (2016)Pitch-based steganography for Speex voice codecSecurity and Communication Networks10.1002/sec.14289:15(2923-2933)Online publication date: 1-Oct-2016
    • (2013)A novel steganography approach for voice over IPJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-013-0212-95:4(601-610)Online publication date: 17-Dec-2013
    • (2012)State-based steganography in low bit rate speechProceedings of the 20th ACM international conference on Multimedia10.1145/2393347.2396395(1109-1112)Online publication date: 29-Oct-2012
    • (2011)Adaptive VoIP Steganography for Information Hiding within Network Audio StreamsProceedings of the 2011 14th International Conference on Network-Based Information Systems10.1109/NBiS.2011.103(612-617)Online publication date: 7-Sep-2011

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media