Covert communications through mobile voice channels

被引:4
|
作者
Kazemi, Reza [1 ]
Rezaei, Roohollah [1 ]
Akhaee, Mohammad A. [2 ]
Behnia, Fereidoon [1 ]
机构
[1] Sharif Univ Technol, Dept Elect & Elect Engn, Tehran, Iran
[2] Univ Tehran, Sch Elect & Comp Engn, Coll Engn, Tehran, Iran
关键词
SPREAD-SPECTRUM WATERMARKING; SCHEME;
D O I
10.1049/iet-ifs.2014.0555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development and growth of cellular mobile networks in recent years has made voice channels widely available almost everywhere. On the other hand, voice dedicated channels possess properties that make them ideal options for high priority real-time secure communications. Beside these realities, information embedding has gained remarkable attention in recent years due to its potential application in multimedia security. In this regard, this study aims to propose an efficient scheme for data hiding to show the feasibility of exploiting these channels for covert communications. To this end, the authors propose new suboptimal but practical schemes based on additive and multiplicative spread spectrum methods. The analytical evaluations of the proposed techniques along with simulation results show proper efficiency of these schemes. Moreover, it is shown that the proposed scheme based on the M-ary bi-orthogonal general maximum likelihood and M-ary bi-orthogonal generalised embedding of multiplicative watermarks techniques outperform the other proposed schemes in this study. Experimental evaluation confirms that the proposed data hiding scheme benefits from an acceptable level of imperceptibility. Finally, the authors propose a security block which considerably increases the robustness of proposed structures against histogram-based steganalysis.
引用
收藏
页码:156 / 164
页数:9
相关论文
共 50 条
  • [1] Covert Communications in Packet Collision Channels
    Sheikholeslami, Azadeh
    Ghaderi, Majid
    Goeckel, Dennis
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [2] Covert Communications on Renewal Packet Channels
    Soltani, Ramin
    Goeckel, Dennis
    Towsley, Don
    Houmansadr, Amir
    2016 54TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2016, : 548 - 555
  • [3] Covert Communications on Poisson Packet Channels
    Soltani, Ramin
    Goeckel, Dennis
    Towsley, Don
    Houmansadr, Amir
    2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 1046 - 1052
  • [4] Covert Communications Over Multiple Overt Channels
    Kim, Sang Wu
    Ta, Hien Q.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (02) : 1112 - 1124
  • [5] Overview of covert communications through networks
    Caloyannides, MA
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS AND INTELLIGENCE (C31) TECHNOLOGIES FOR HOMELAND DEFENSE AND LAW ENFORCEMENT, 2002, 4708 : 13 - 17
  • [6] Covert Communications through Imperfect Cancellation
    Chew, Daniel
    Nguyen, Christine
    Berhanu, Samuel
    Baumgart, Chris
    Cooper, A. Brinton
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH-MMSEC 2022, 2022, : 63 - 68
  • [7] Probabilistic Obfuscation through Covert Channels
    Stephens, Jon
    Yadegari, Babak
    Collberg, Christian
    Debray, Saumya
    Scheidegger, Carlos
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 243 - 257
  • [8] Covert communications through network configuration messages
    Rios, Ruben
    Onieva, Jose A.
    Lopez, Javier
    COMPUTERS & SECURITY, 2013, 39 : 34 - 46
  • [9] Covert voice over internet protocol communications based on spatial model
    HUANG YongFeng
    TANG ShanYu
    Science China(Technological Sciences), 2016, 59 (01) : 117 - 127
  • [10] Covert voice over internet protocol communications based on spatial model
    Huang YongFeng
    Tang ShanYu
    SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2016, 59 (01) : 117 - 127