Skip to main content

A Reliable Covert Communication Scheme Based on VoIP Steganography

  • Chapter
  • First Online:
Transactions on Data Hiding and Multimedia Security X

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 8948))

Abstract

Steganography is the science of hiding information in such a way that an adversary wouldn’t know it existed. A significant amount of research has been done in this field for non-real time mediums. Research on real time mediums, for example Voice over Internet Protocol (VoIP), isn’t as mature. In this paper, we propose an algorithm that enables data hiding in G.711, the most commonly used voice codec for VoIP devices, while gracefully handling packet loss. This would allow two telephone users to covertly transfer multiple pieces of arbitrary information between their respective systems in a reliable manner. We use important performance metrics to evaluate our algorithm, namely, throughput, noise-to-signal ratio and the Perceptual Evaluation of Speech Quality algorithm. We demonstrate that our algorithm performs well compared to other algorithms proposed in the literature in real world environments, where packet loss is inevitable, by maintaining high throughput and good speech quality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Artz, D.: Digital steganography: hiding data within data. IEEE Internet Comput. 5, 75–80 (2001)

    Article  Google Scholar 

  2. Murdoch, S.J., Lewis, S.: Embedding covert channels into TCP/IP. In: Barni, M., Herrera-Joancomarti, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 247–261. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Tian, H., et al.: An adaptive steganography scheme for voice over IP. Huazhong University of Science & Technology, University of Nebraska, Tsinghua University (2009) doi:10.1109/ISCAS.2009.5118414

  4. Yongfeng, H., Bo, X., Honghua, X.: Implementation of covert communication based on steganography. Department of Electronic Engineering, Tsinghua University, Beijing (2008). doi:10.1109/IIH-MSP.2008.174

  5. Karapantazis, S., Pavlidou, F.-N.: VoIP: a comprehensive survey on a promising technology. Thessaloniki (2009). doi:10.1016/j.comnet.2009.03.010

  6. International Telecommunication Union: Packet-based multimedia communications (Recommendation ITU-T H.323) (2009)

    Google Scholar 

  7. International Telecommunication Union: Pulse Code Modulation (PCM) of Voice Frequencies (ITU-T Recommendation G.711) (1993)

    Google Scholar 

  8. Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. University of Toronto, Toronto (2002). 1-58113-000-0/00/0000

    Google Scholar 

  9. Mazurczyk, W., Lubacz, J.: LACK - a VoIP steganographic method. Institute of Telecommunications, Warsaw University, Warsaw (2009). doi:10.1007/s11235-009-9245-y

  10. Mazurczyk, W.: Lost audio packets steganography: the first practical evaluation. Warsaw University of Technology, Institute of Telecommunications, Warsaw, arXiv:1107.4076v1 (2011)

    Google Scholar 

  11. Hamdaqa, M., Tahvildari, L.: ReLACK: a reliable VoIP steganography approach. In: IEEE Fifth International Conference on Secure Software Integration and Reliability Improvement, Jeju Island, pp. 189–197 (2011)

    Google Scholar 

  12. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  13. Miao, R., Huang, Y.: An approach of covert communication based on the adaptive steganography scheme on voice over IP. Department of Electronic Engineering, Tsinghua University, Beijing (2011). ISBN: 978-1-61284-231-8

    Google Scholar 

  14. Ito, A., Abe, S., Suzuki, Y.: Information hiding for G.711 speech based on substitution of least significant bits and estimation of tolerable distortion. Tohoku University, Sendai (2009). ISBN: 978-1-4244-2354-5

    Google Scholar 

  15. International Telecommunication Union: Perceptual evaluation of speech quality (Recommendation ITU-T P.862) (2001)

    Google Scholar 

  16. Aoki, N.: A band extension technique for G.711 speech using steganography. IEICE Trans. Commun. E89-B(6), 1896–1898 (2006)

    Article  Google Scholar 

  17. International Telecommunication Union: Perceptual objective listening quality assessment (ITU-T Recommendation P.863) (2011)

    Google Scholar 

  18. CenturyLink: CenturyLink IP Network Statistics, December 2011. https://kai02.centurylink.com/PtapRpts/Public/BackboneReport.aspx

  19. Neal, H., ElAarag, H.: A packet loss tolerant algorithm for information hiding in voice over IP. In: Proceedings of IEEE Southeast Conference, Orlando, FL, 15–18 March 2012

    Google Scholar 

  20. ElAarag, H., Neal, H.: Performance analysis of current data hiding algorithms for VoIP. In: Proceedings of the Communication and Networking Simulation Symposium, Spring Simulation Multiconference, San Diego, CA, 7–10 April 2013

    Google Scholar 

  21. Latzenbeisser, S.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, New York (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hala ElAarag .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Neal, H., ElAarag, H. (2015). A Reliable Covert Communication Scheme Based on VoIP Steganography. In: Shi, Y. (eds) Transactions on Data Hiding and Multimedia Security X. Lecture Notes in Computer Science(), vol 8948. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46739-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46739-8_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46738-1

  • Online ISBN: 978-3-662-46739-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics