期刊文献+

Frame-bitrate-change based steganography for voice-over-IP 被引量:4

Frame-bitrate-change based steganography for voice-over-IP
在线阅读 下载PDF
导出
摘要 Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on frames is often independent of the inherent speech features, which may lead to great degradation of speech quality. A novel frame-bitrate-change based steganography is proposed in this work, which discovers a novel covert channel for Vo IP and introduces less distortion. This method exploits the feature of multi-rate speech codecs that the practical bitrate of speech frame is identified only by speech decoder at receiving end. Based on this characteristic, two steganography strategies called bitrate downgrading(BD) and bitrate switching(BS)are provided. The first strategy substitutes high bit-rate speech frames with lower ones to embed secret message, which introduces very low distortion in practice, and much less than other bits-modification based methods with the same embedding capacity. The second one encodes secret message bits into different types of speech frames, which is an alternative choice for supplement. The two strategies are implemented and tested on our covert communication system Steg Vo IP. The experiment results show that our proposed method is effective and fulfills the real-time requirement of Vo IP communication. Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on frames is often independent of the inherent speech features, which may lead to great degradation of speech quality. A novel frame-bitrate-change based steganography is proposed in this work, which discovers a novel covert channel for Vo IP and introduces less distortion. This method exploits the feature of multi-rate speech codecs that the practical bitrate of speech frame is identified only by speech decoder at receiving end. Based on this characteristic, two steganography strategies called bitrate downgrading(BD) and bitrate switching(BS)are provided. The first strategy substitutes high bit-rate speech frames with lower ones to embed secret message, which introduces very low distortion in practice, and much less than other bits-modification based methods with the same embedding capacity. The second one encodes secret message bits into different types of speech frames, which is an alternative choice for supplement. The two strategies are implemented and tested on our covert communication system Steg Vo IP. The experiment results show that our proposed method is effective and fulfills the real-time requirement of Vo IP communication.
出处 《Journal of Central South University》 SCIE EI CAS 2014年第12期4544-4552,共9页 中南大学学报(英文版)
基金 Project(2011CB302305)supported by National Basic Research Program(973 Program)of China Projects(61232004,61302094)supported by National Natural Science Foundation of China Project(ZQN-PY115)supported by Promotion Program for Young and Middle-aged Teacher in Science and Technology Research of Huaqiao University,China Project(JA13012)supported by Education Science Research Program for Young and Middle-aged Teacher of Fujian Province of China Project(2014J01238)supported by Natural Science Foundation of Fujian Province of China
关键词 covert communication steganography multi-rate speech codec voice-over-IP(VOIP) 语音帧 码率 高比特率 声音 语音编解码器 语音解码器 有效载荷 隐蔽通信
  • 相关文献

参考文献3

二级参考文献39

  • 1周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101. 被引量:26
  • 2陈波,谭运猛,吴世忠.信息隐藏技术综述[J].计算机与数字工程,2005,33(2):21-23. 被引量:38
  • 3Provos N,Honeyman P.Hide and Seek:an Introduction to Steganography[J].IEEE Security & Privacy,2003,1(3):32-44.
  • 4Wang H,Wang S.Cyber Warfare:Steganography vs Steganalysis[J].Communications of the ACM,2004,47(10):76-82.
  • 5Cachin C.An Information-Theoretic Model for Steganography[C]//Information Hiding,Second International Workshop,IH98.Portland:Proceedings,1998:307-318.
  • 6Moulin P,O'Sullivan J A.Information-Theoretic Analysis of Information Hiding[J].IEEE Trans on Information Theory,2003,49(3):563-593.
  • 7Fridrich J,Rui D.Secure Stegangraphic Methods for Palette Images:Vol 1 768[C]//The 3rd Information Hiding Workshop,Lecture in Computer Science.Berlin:Springer-Verlag,2000:47-60.Zhou Wenjin,Fan Mingyu,Wang Guangwei.An Information Hiding Method to LSB of BMP Images[J].China Information Security,2005,7:253-255.
  • 8Dittmann J,Stabenau M,Steinmetz R.Robust MPEG Video Watermarking Technologies[C]//Proceedings of the Sixth ACM International Conference on Multimedia.Bristol:ACM,1998:71-80.
  • 9Xu Changyong,Ping Xijian,Zhang Tao.Steganography in Compressed Video Stream[C]//Proceedings of the First International Conference on Innovative Computing,Information and Control (ICICIC'06).Washington:IEEE Computer Society,2006:269-272.
  • 10Dittmann J,Vogel T,Hillert R.Design and Evaluation of Steganography for Voice-over-IP[C]//Circuits and Systems,ISCAS 2006.Island of Kos:IEEE CAS Society,2006:4-7.

共引文献18

同被引文献4

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部