A High-Capacity Covering Code for Voice-Over-IP Steganography

A High-Capacity Covering Code for Voice-Over-IP Steganography

Hui Tian, Jie Qin, Yongfeng Huang, Xu An Wang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai
DOI: 10.4018/IJITWE.2015070104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Although steganographic transparency and embedding capacity are considered to be two conflicting objectives in the design of steganographic systems, it is possible and necessary to strike a good balance between them in Voice-over-IP steganography. In this paper, to improve steganographic transparency while maintaining relatively large embedding capacity, the authors present a (2n-1, 2n) covering code, which can hide 2n-1 bits of secret messages into 2n bits of cover messages with not more than n-bit changed. Specifically, each (2n-1)-bit secret message is first transformed into two 2n-bit candidate codewords. In embedding process, the cover message is replaced with the optimal codeword more similar with it. In this way, the embedding distortion can be largely reduced. The proposed method is evaluated by comparing with existing ones with a large number of ITU-T G.729a encoded speech samples. The experimental results show that the authors' scheme can provide good performance on both steganographic transparency and embedding capacity, and achieve better balance between the two objectives than the existing ones.
Article Preview
Top

1. Introduction

With the rapid development of networks, how to achieve secure communication in an open environment is becoming increasingly important. So far, lots of research effort has been made in this field (Yang, 2004). Particularly in recent years, a new alternative technique for secure communications, called steganography, has attracted increasing attention, of which the target is to conceal secret data into public covers (e.g. images, audios, videos and texts) to achieve covert communications (Provos et al., 2003, Zielinska et al., 2014). In contrast with traditional techniques based on cryptographies, whose purpose are to hide the content of secret messages being exchanged between two communicating parties, the goal of steganography is to conceal not only the content but also its very existence. Thus, steganography can provide better protection for secret data in a sense.

Hitherto, a great number of researches on steganography have been carried out, and target steganographic covers have been also extended from initial images to almost all multimedia (Zielinska et al., 2014, El-Eman et al., 2015, Li et al., 2015, Ramalingam et al., 2015, Satir et al., 2014). Recently, a novel dynamic steganographic cover, Voice over Internet Protocol (VoIP, also named IP telephony), has attracted increasing interest (Huang et al., 2011a, Lubacz et al., 2010, Mazurczyk et al., 2013, Tian et al., 2011, 2012, 2015a, 2015b), which has three main advantages over traditional storage media (Tian et al., 2011, 2012a, 2015a, 2015b). First, the real-time nature of VoIP provides better security for secret messages by virtue of its instantaneity, because it gives eavesdroppers almost no time to discover possible abnormity owing to concealed messages. Second, VoIP can be considered a multi-dimensional carrier in that both the packet protocol headers and the payload data can be employed to conceal information. Third, the duration of a VoIP conversation is dynamic and variable, so it can offer adequate cover data according to the requirement of covert communication. In virtue of the above advanced characteristics, VoIP-based steganography can provide another sophisticated solution for secure communication.

Complete Article List

Search this Journal:
Reset
Volume 19: 1 Issue (2024)
Volume 18: 1 Issue (2023)
Volume 17: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 16: 4 Issues (2021)
Volume 15: 4 Issues (2020)
Volume 14: 4 Issues (2019)
Volume 13: 4 Issues (2018)
Volume 12: 4 Issues (2017)
Volume 11: 4 Issues (2016)
Volume 10: 4 Issues (2015)
Volume 9: 4 Issues (2014)
Volume 8: 4 Issues (2013)
Volume 7: 4 Issues (2012)
Volume 6: 4 Issues (2011)
Volume 5: 4 Issues (2010)
Volume 4: 4 Issues (2009)
Volume 3: 4 Issues (2008)
Volume 2: 4 Issues (2007)
Volume 1: 4 Issues (2006)
View Complete Journal Contents Listing