Abstract
In homeland defense and security, secure data transfer is still critical challenging due to the open nature of Internet. One of the solutions which came to the rescue is the VoIP (Voice over IP) steganography. VoIP is unquestionably the most popular real-time service in IP networks today. To date, existing VoIP steganography research commonly focus on information hiding in the LSB bits of network audio streams. However, this approach may raise serious security threat, where the hidden information may be easily removed, detected and attacked. Towards this issue, we propose AVIS, a novel Adaptive VoIP steganography approach to hide information within network audio streams. AVIS consists of three parts, named VAMI, VADDI and VODO. VAMI works by dynamically selecting multiple bits based on the VoIP vector value, VADDI dynamically changes embedding intervals to avoid detection and attacking, and VODO try to change the neighbor bits to offset the sound distortion. Also, we evaluate the effectiveness of this approach with G.711 as the codec of the cover speech in Linphone, a famous open-source VoIP software. The experimental results demonstrate that our approach provides better performance than the traditional one.















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Aoki N (2003) A packet loss concealment technique for voip using steganography based on pitch waveform replication. IEICE Trans Commun 86(12):2551–2560
Bailey K, Curran K (2006) An evaluation of image based steganography methods. Multimedia Tools Appl 30(1):55–88
Castiglione A, Cattaneo G, De Santis A, Petagna F, Petrillo UF (2006) Speech: Secure personal end-to-end communication with handheld. In: ISSE 2006 Securing Electronic Busines Processes. Springer, pp 287–297
Castiglione A, D’Alessio B, De Santis A (2011a) Steganography and secure communication on online social networks and online photo sharing. In: International Conference on Broadband and wireless computing, communication and applications (BWCCA), 2011. IEEE, pp 363–368
Castiglione A, DAlessio B, De Santis A, Palmieri F (2011b) New steganographic techniques for the ooxml file format. In: Availability, reliability and security for business, enterprise and health information systems. Springer, pp 344–358
Castiglione A, De Santis A, Fiore U, Palmieri F (2011c) E-mail-based covert channels for asynchronous message steganography. In: Fifth International Conference on innovative mobile and internet services in ubiquitous computing (IMIS), 2011. IEEE, pp 503–508
Castiglione A, Cattaneo G, Cembalo M, De Santis A, Faruolo P, Petagna F, Petrillo UF (2012) Engineering a secure mobile messaging framework. Comput Security 31(6):771–781
Castiglione A, De Santis A, Fiore U, Palmieri F (2012) An asynchronous covert channel using spam. Comput Math Appl 63(2):437–447
Dittmann J, Hesse D (2004) Network based intrusion detection to detect steganographic communication channels: on the example of audio data. In: IEEE 6th Workshop on multimedia signal processing, 2004. IEEE, pp 343–346
Dittmann J, Hesse D, Hillert R (2005) Steganography and steganalysis in voice-over ip scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Electronic Imaging 2005. International Society for Optics and Photonics, pp 607–618
Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007
Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007
Grothoff C, Grothoff K, Alkhutova L, Stutsman R, Atallah M (2005) Translation-based steganography. In: Information hiding. Springer, pp 219–233
Harada N, Kamamoto Y, Moriya T, Hiwasaki Y, Ramalho MA, Netsch L, Stachurski J, Miao L, Taddei H, Qi F (2010) Emerging itu-t standard g. 711.0lossless compression of g. 711 pulse code modulation. In: IEEE International Conference on acoustics speech and signal processing (ICASSP), 2010. IEEE, pp 4658–4661
Kratzer C, Dittmann J, Vogel T, Hillert R (2006) Design and evaluation of steganography for voice-over-ip. In: IEEE International Symposium on circuits and systems, 2006. ISCAS 2006 Proceedings. IEEE
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Trans Inf Forensics Security 5(2):201–214
Mazurczyk W, Szczypiorski K (2008) Steganography of voip streams. In: On the move to meaningful internet systems: OTM 2008. Springer, pp 1001–1018
Mazurczyk W, Karas M, Szczypiorski K (2013) Skyde: a skype-based steganographic method. arXiv preprint arXiv:1301.3632
Neal H, ElAarag H (2013) Performance analysis of current data hiding algorithms for voip. In: Proceedings of the 16th communications and networking symposium. Society for Computer Simulation International 7
ITU-T P.800.1 (2006) Mean opinion score (mos) terminology
ITU-T P.862 (2001) Perceptual evaluation of speech quality (pesq): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs
Palmieri F, Fiore U (2009) Providing true end-to-end security in converged voice over ip infrastructures. Comput Security 28(6):433–449
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security Privacy 1(3):32–44
Shirali-Shahreza M (2006) A new method for real-time steganography. In: 8th International Conference on signal processing, 2006, vol 4. IEEE
Tian H, Zhou K, Huang Y, Feng D, Liu J (2008) A covert communication model based on least significant bits steganography in voice over ip. In: The 9th International Conference for Young Computer Scientists, 2008. ICYCS 2008. IEEE, pp 647–652
Tian H, Zhou K, Jiang H, Feng D (2009a) Digital logic based encoding strategies for steganography on voice-over-ip. In: Proceedings of the 17th ACM international conference on Multimedia. ACM, pp 777–780
Tian H, Zhou K, Jiang H, Liu J, Huang Y, Feng D (2009b) An m-sequence based steganography model for voice over ip. In: IEEE International Conference on Communications, 2009. ICC’09. IEEE, pp 1–5
Tian H, Zhou K, Jiang H, Liu J, Huang Y, Feng D (2009c) An m-sequence based steganography model for voice over ip. In: IEEE International Conference on communications, 2009. ICC’09. IEEE, pp 1–5
Wang C, Wu Q (2007a) Information hiding in real-time voip streams. In: Ninth IEEE International Symposium on Multimedia, 2007. ISM 2007. IEEE, pp 255–262
Wang C, Wu Q (2007b) Information hiding in real-time voip streams. In: Ninth IEEE International Symposium on Multimedia, 2007. ISM 2007. IEEE, pp 255–262
Wu Z, Yang W (2006) G. 711-based adaptive speech information hiding approach. In: Intelligent computing. Springer, pp 1139–1144
Acknowledgments
The work described in this paper is partially supported by the grants of the National Basic Research Program of China (973 project) under Grant No. 2009CB 320503, 2012CB 315906; the project of National Science Foundation of China under grant No. 61070199, 61103189, 61103194, 61103182, 61202488, 61272482; the National High Technology Research and Development Program of China (863 Program) No. 2011AA01A103, 2012AA01A506, 2013AA013505, the Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20114307110006, 20124307120032, the program for Changjiang Scholars and Innovative Research Team in University (No. IRT1012) and Hunan Province Natural Science Foundation of China (11JJ7003).
Author information
Authors and Affiliations
Corresponding author
Additional information
Part of this work has been appeared in the conference proceedings of NBiS 2011.
Rights and permissions
About this article
Cite this article
Wei, Z., Zhao, B., Liu, B. et al. A novel steganography approach for voice over IP. J Ambient Intell Human Comput 5, 601–610 (2014). https://doi.org/10.1007/s12652-013-0212-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-013-0212-9