Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation

被引:22
|
作者
Tian, Hui [1 ]
Sun, Jun [1 ]
Chang, Chin-Chen [2 ]
Qin, Jie [1 ]
Chen, Yonghong [1 ]
机构
[1] Natl Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Feng Chia Univ, Dept Informat & Comp Sci, Taichung 40724, Taiwan
关键词
Steganography; voice over IP; adaptive bitrate modulation; covert communication; STEGANOGRAPHY; COMMUNICATION;
D O I
10.1109/LCOMM.2017.2659718
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Information hiding based on bitrate switching is a novel steganographic scheme for voice over IP, which can resist traditional steganalysis methods. However, the state-of-the-art method has not achieved its best embedding performance. Thus, in this letter, we present two adaptive bitrate modulatingbased steganographic methods introducing Hamming matrix encoding (HME) strategy. The first one can conceal [log2(n + 1)] bits of secret data into n speech frames with at most one bitrate switching by applying the HME strategy to each frame group, while the second one, compared with the state-of-the-art method, can embed (1 + [log2(n + 1)])/2 bits of secret data into n speech frames without increasing the number of bitrate switches by only employing the HME strategy for the frame groups with bitrate switching. The theoretical analysis and experimental evaluation demonstrate that the proposed methods are feasible, and outperform the existing one on both covert bandwidth and embedding efficiency while achieving the comparably good steganographic transparency.
引用
收藏
页码:749 / 752
页数:4
相关论文
共 50 条
  • [1] Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication
    Tian, Hui
    Sun, Jun
    Chang, Chin-Chen
    Huang, Yongfeng
    Chen, Yonghong
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (06) : 1196 - 1199
  • [2] A Security Evaluation Method for Voice-Over-IP streaming media information hiding
    Hu, Xiaoyan
    Zhang, Lejun
    Huang, Tianwen
    Lei, Xiaoying
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 228 - 232
  • [3] Frame-bitrate-change based steganography for voice-over-IP
    刘进
    田晖
    周可
    JournalofCentralSouthUniversity, 2014, 21 (12) : 4544 - 4552
  • [4] Frame-bitrate-change based steganography for voice-over-IP
    Liu Jin
    Tian Hui
    Zhou Ke
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2014, 21 (12) : 4544 - 4552
  • [5] Frame-bitrate-change based steganography for voice-over-IP
    Jin Liu
    Hui Tian
    Ke Zhou
    Journal of Central South University, 2014, 21 : 4544 - 4552
  • [6] Voice-over-IP
    不详
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2006, 123 (1-2): : A11 - A11
  • [7] Information leakage in ubiquitous Voice-over-IP communications
    Neumann, Thorsten
    Tillwick, Heiko
    Olivier, Martin S.
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 233 - 242
  • [8] Secure Voice-over-IP
    Dunte, Markus
    Ruland, Christoph
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (06): : 63 - 68
  • [9] Voice-over-IP matchmakers
    Telephony, 1998, 235 (18):
  • [10] On the Study of Voice-over-IP
    Li, Jinci
    NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B, 2012, 1479 : 886 - 889