Skip to main content

A Model for the Effective Steganalysis of VoIP

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 325))

Abstract

The latest studies and applications in steganography are based on Internet, particularly voice over IP (VoIP). VoIP has proved itself to be a perfect carrier for hidden data. Most of the approaches for VoIP steganalysis focus on detecting hidden data in the payload of the packets, by extending audio steganalysis methods. Here, we propose an effective steganalysis method which considers the speech behavior as well as network protocol structure to detect hidden communication. The common statistical features, like mean, covariance, etc., are also considered for effective classification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. T. Takahashi, W. Lee, An assessment of VoIP covert channel threats, in Security and Privacy in Communications Networks and the Workshops. Third International Conference on IEEE (2007), pp. 371–380

    Google Scholar 

  2. W. Mazurczyk, VoIP steganography and its detection—a survey. ACM Comput. Surv. (CSUR) 46(2), 20 (2013)

    Google Scholar 

  3. C.J. Burges, A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Disc. 2(2), 121–167 (1998)

    Article  Google Scholar 

  4. F.G. Mohammadi, M.S. Abadeh, A survey of data mining techniques for steganalysis, in Recent Advances in Steganography (2012), pp. 1–25

    Google Scholar 

  5. C. Kraetzer, J. Dittmann, Mel-cepstrum-based steganalysis for VoIP steganography, in Electronic Imaging (2007), p. 650505

    Google Scholar 

  6. A. Janicki, W. Mazurczyk, K. Szczypiorski, Steganalysis of transcoding steganography, in Annals of telecommunications (2012), pp. 1–12

    Google Scholar 

  7. W. Mazurczyk, P. Szaga, K. Szczypiorski, Using transcoding for hidden communication in IP telephony, in Multimedia Tools Applications (2012), pp. 1–27

    Google Scholar 

  8. XXX

    Google Scholar 

  9. C.C. Chang, C.J. Lin, LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST). 2(3), 27 (2011)

    Google Scholar 

  10. Y. Huang, S. Tang, C. Bao, Y.J. Yip, Steganalysis of compressed speech to detect covert voice over Internet protocol channels. Inf. Secur. IET. 5(1), 26–32 (2011)

    Article  Google Scholar 

  11. W. Mazurczyk, K. Szczypiorski, Steganography of VoIP streams, in On the Move to Meaningful Internet Systems: OTM, ed. by R. Meersman, Z. Tari (Springer, Berlin, 2008), pp. 1001–1018

    Google Scholar 

  12. J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in Electronic Imaging (2005), pp. 607–618

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Jayasree .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Jayasree, N., Amritha, P.P. (2015). A Model for the Effective Steganalysis of VoIP. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 325. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2135-7_41

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2135-7_41

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2134-0

  • Online ISBN: 978-81-322-2135-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics