Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation

被引:22
|
作者
Tian, Hui [1 ]
Sun, Jun [1 ]
Chang, Chin-Chen [2 ]
Qin, Jie [1 ]
Chen, Yonghong [1 ]
机构
[1] Natl Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Feng Chia Univ, Dept Informat & Comp Sci, Taichung 40724, Taiwan
关键词
Steganography; voice over IP; adaptive bitrate modulation; covert communication; STEGANOGRAPHY; COMMUNICATION;
D O I
10.1109/LCOMM.2017.2659718
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Information hiding based on bitrate switching is a novel steganographic scheme for voice over IP, which can resist traditional steganalysis methods. However, the state-of-the-art method has not achieved its best embedding performance. Thus, in this letter, we present two adaptive bitrate modulatingbased steganographic methods introducing Hamming matrix encoding (HME) strategy. The first one can conceal [log2(n + 1)] bits of secret data into n speech frames with at most one bitrate switching by applying the HME strategy to each frame group, while the second one, compared with the state-of-the-art method, can embed (1 + [log2(n + 1)])/2 bits of secret data into n speech frames without increasing the number of bitrate switches by only employing the HME strategy for the frame groups with bitrate switching. The theoretical analysis and experimental evaluation demonstrate that the proposed methods are feasible, and outperform the existing one on both covert bandwidth and embedding efficiency while achieving the comparably good steganographic transparency.
引用
收藏
页码:749 / 752
页数:4
相关论文
共 50 条
  • [41] Dynamic matrix encoding strategy for voice-over-IP steganography
    Tian Hui
    Zhou Ke
    Feng Dan
    JOURNAL OF CENTRAL SOUTH UNIVERSITY OF TECHNOLOGY, 2010, 17 (06): : 1285 - 1292
  • [42] Dynamic matrix encoding strategy for voice-over-IP steganography
    Hui Tian
    Ke Zhou
    Dan Feng
    Journal of Central South University of Technology, 2010, 17 : 1285 - 1292
  • [43] Efficient QoS support for voice-over-IP applications using selective packet marking
    Sanneck, H
    Le, NTL
    Wolisz, A
    PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : A553 - A556
  • [44] Applying scheduling policies to improve QoE in wireless Voice-over-IP
    Lambrinos, Lambros
    Djouvas, Constantinos
    2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, : 366 - 370
  • [45] Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography
    Tian, Hui
    Jiang, Hong
    Zhou, Ke
    Feng, Dan
    COMPUTER JOURNAL, 2012, 55 (06): : 702 - 716
  • [46] Quality assessment and usage behavior of a mobile voice-over-IP service
    De Pessemier, Toon
    Stevens, Isabelle
    De Marez, Lieven
    Martens, Luc
    Joseph, Wout
    TELECOMMUNICATION SYSTEMS, 2016, 61 (03) : 417 - 432
  • [47] A High-Capacity Covering Code for Voice-Over-IP Steganography
    Tian, Hui
    Qin, Jie
    Huang, Yongfeng
    Wang, Xu An
    Liu, Jin
    Chen, Yonghong
    Wang, Tian
    Cai, Yiqiao
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2015, 10 (03) : 46 - 63
  • [48] Accurate dimensioning of service level agreements in voice-over-IP networks
    Stewart, R
    Schormans, J
    JOURNAL OF THE INSTITUTION OF BRITISH TELECOMMUNICATIONS ENGINEERS, 2001, 2 : 109 - 111
  • [49] Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP
    Compagno, Alberto
    Conti, Mauro
    Lain, Daniele
    Tsudik, Gene
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 703 - 715
  • [50] Voice-over-IP security - State-of-the-art, risks, and concepts
    Eren, Evren
    Detken, Kai-Oliver
    INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2007, : 126 - +