An Efficient VoIP Steganography Based on Random Binary Matrix

被引:6
|
作者
Qin, Jie [1 ]
Tian, Hui [1 ]
Huang, Yongfeng [2 ]
Liu, Jin [1 ]
Chen, Yonghong [1 ]
Wang, Tian [1 ]
Cai, Yiqiao [1 ]
Wang, Xu An [3 ]
机构
[1] Natl Huaqiao Univ, Coll Comp Sci & Technol, Xiamen, Peoples R China
[2] Tsinghua Univ, Dept Elect Engn, Beijing, Peoples R China
[3] Engn Univ CAPF, Xian, Peoples R China
来源
2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC) | 2015年
关键词
information hiding; steganography; transparency; matrix transformation;
D O I
10.1109/3PGCIC.2015.65
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To reduce the distortion while maintaining relatively large embedding capacity, a steganographic scheme based on random binary matrix is presented in this paper. We first design a 3x4 covering code, which can hide 3 bits of secret messages into 4 bits of cover messages with not more than 2-bit changed. Further, we construct a random binary matrix with cover bits at diagonal lines for steganography, and conceal secret messages into each four cover bits encrypted with the other binary bits of their rows or columns using the above 3x4 covering code. The proposed scheme is evaluated with a large number of G.711 encode speech samples. The experimental results show that our scheme can provide good performance on both steganographic transparency and embedding capacity.
引用
收藏
页码:462 / 465
页数:4
相关论文
共 50 条
  • [1] Steganography of VoIP Streams
    Mazurczyk, Wojciech
    Szczypiorski, Krzysztof
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PT II, PROCEEDINGS, 2008, 5332 : 1001 - +
  • [2] A Security Model for VoIP Steganography
    Yu, Zhiwei
    Thomborson, Clark
    Wang, Chaokun
    Fu, Junning
    Wang, Jianmin
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 35 - +
  • [3] VoIP Steganography Methods, a Survey
    Deepikaa, S.
    Saravanan, R.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2019, 19 (01) : 73 - 87
  • [4] Color Image Steganography Using Random Key Matrix
    Anurag
    Meena, Shweta
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [5] Coverless Data Hiding in VoIP based on DNA Steganography with Authentication
    Soundararajan, Deepikaa
    Ramakrishnan, Saravanan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (02) : 190 - 198
  • [6] Mel-cepstrum based steganalysis for VoIP-steganography
    Kraetzer, Christian
    Dittmann, Jana
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
  • [7] On the rank of a random binary matrix
    Cooper, Colin
    Frieze, Alan
    Pegden, Wesley
    ELECTRONIC JOURNAL OF COMBINATORICS, 2019, 26 (04):
  • [8] Binary image steganography based on permutation
    Juvet Karnel Sadié
    Stéphane Gael R. Ekodeck
    René Ndoundam
    Iran Journal of Computer Science, 2023, 6 (4) : 321 - 332
  • [9] Matrix embedding in steganography with binary Reed-Muller codes
    Yang, Tingya
    Chen, Houshou
    IET IMAGE PROCESSING, 2017, 11 (07) : 522 - 529
  • [10] BINARY CORRELATIONS IN RANDOM MATRIX SPECTRA
    PANDEY, A
    FRENCH, JB
    JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 1979, 12 (05): : L83 - L88