Abstract
The latest studies and applications in steganography are based on Internet, particularly voice over IP (VoIP). VoIP has proved itself to be a perfect carrier for hidden data. Most of the approaches for VoIP steganalysis focus on detecting hidden data in the payload of the packets, by extending audio steganalysis methods. Here, we propose an effective steganalysis method which considers the speech behavior as well as network protocol structure to detect hidden communication. The common statistical features, like mean, covariance, etc., are also considered for effective classification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
T. Takahashi, W. Lee, An assessment of VoIP covert channel threats, in Security and Privacy in Communications Networks and the Workshops. Third International Conference on IEEE (2007), pp. 371–380
W. Mazurczyk, VoIP steganography and its detection—a survey. ACM Comput. Surv. (CSUR) 46(2), 20 (2013)
C.J. Burges, A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Disc. 2(2), 121–167 (1998)
F.G. Mohammadi, M.S. Abadeh, A survey of data mining techniques for steganalysis, in Recent Advances in Steganography (2012), pp. 1–25
C. Kraetzer, J. Dittmann, Mel-cepstrum-based steganalysis for VoIP steganography, in Electronic Imaging (2007), p. 650505
A. Janicki, W. Mazurczyk, K. Szczypiorski, Steganalysis of transcoding steganography, in Annals of telecommunications (2012), pp. 1–12
W. Mazurczyk, P. Szaga, K. Szczypiorski, Using transcoding for hidden communication in IP telephony, in Multimedia Tools Applications (2012), pp. 1–27
XXX
C.C. Chang, C.J. Lin, LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST). 2(3), 27 (2011)
Y. Huang, S. Tang, C. Bao, Y.J. Yip, Steganalysis of compressed speech to detect covert voice over Internet protocol channels. Inf. Secur. IET. 5(1), 26–32 (2011)
W. Mazurczyk, K. Szczypiorski, Steganography of VoIP streams, in On the Move to Meaningful Internet Systems: OTM, ed. by R. Meersman, Z. Tari (Springer, Berlin, 2008), pp. 1001–1018
J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in Electronic Imaging (2005), pp. 607–618
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Jayasree, N., Amritha, P.P. (2015). A Model for the Effective Steganalysis of VoIP. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 325. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2135-7_41
Download citation
DOI: https://doi.org/10.1007/978-81-322-2135-7_41
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2134-0
Online ISBN: 978-81-322-2135-7
eBook Packages: EngineeringEngineering (R0)