Abstract
This paper presents a new spatial steganography model for covert communications over voice over internet protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert VoIP communications. By taking into account the variation characteristics of VoIP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on VoIP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of VoIP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert VoIP communications.
Similar content being viewed by others
References
Zander S, Armitage G, Branch P. Covert channels and countermeasures in computer network protocols. IEEE Commun Mag, 2007, 45: 136–142
Luo X, Chan E W W, Chang R K C. TCP covert timing channels: Design and detection. In: Proc. of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Anchorage, Alaska, 2008. 420–429
Sellke S H, Wang C, Bagchi S, et al. TCP/IP timing channels: Theory to implementation. In: Proc. of 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, 2009. 2204–2212
Bai L Y, Huang Y, Hou G, et al. Covert channels based on Jitter field of the RTCP header. In: Proc. of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 1388–1391
Huang Y, Xiao B, Xiao H. Implementation of covert communication based on steganography. In: Proc. of 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 1512–1515
Aoki N. A technique of lossless steganography for G.711 telephony speech. In: Proc. of Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 608–611
Su Y, Huang Y, Li X. Steganography-oriented noisy resistance model of G.729a. In: Proc. of 2006 IMACS Multi-conference on Computational Engineering in Systems Applications, Beijing, China, 2006. 11–15
Liu L, Li M, Li Q, et al. Perceptually transparent information hiding in G.729 bitstream. In: Proc. of 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 406–409
Xiao B, Huang Y, Tang S. An approach to information hiding in low bit-rate speech stream. In: Proc. of IEEE Global Telecommunications, USA, 2008. 371–375
Mazurczyk W, Lubacz J. LACKa VoIP steganographic method. Telecommun Syst J, 2010, 45: 153–163
Lubacz J, Mazurczyk W, Szczypiorski K. Principles and overview of network steganography. IEEE Commun Mag, 2014, 52, 225–229
Druid. Real-time steganography with RTP. http://druid.caughq.org, 01 December 2011
Kratzer C, Dittmann J, Vogel T, et al. Design and evaluation of steganography for Voice-over-IP. In: Proc. of 2006 IEEE International Symposium on Circuits and Systems, Island of Kos, Greece, 2006. 2397–2340
Cachin C. An information-theoretic model for steganography. Inform Comput, 2004, 192: 41–56
Bo X, Huang Y F. Reliable transmission of information hiding communication over stream-media. J Xidian Univ, 2008, 35: 554–558
Mazurczyk W, Kotulski Z. Covert channel for improving VoIP security. In: Proc. of 2006 Multi-conference on Advanced Computer Systems, Międzyzdroje, Poland, 2006. 311–320
Wang C, Wu Q. Information hiding in real-time VoIP streams. In: Proc. of 9th IEEE International Symposium on Multimedia, Taichung, Taiwan, 2007. 255–262
Huang Y F, Tang S, Yuan J. Steganography in inactive frames of VoIP streams encoded by source codec. IEEE T Inform Forensics Secur, 2011, 6: 296–306
Li X, Yang B, Cheng D, et al. A generalization of LSB matching. IEEE Signal Proc Let, 2009, 16: 69–72
Aoki N. A band extension technique for G.711 speech using steganography. IEICE T Commun, 2006, 89: 1896–1898
Huang Y, Tang S, Bao C, et al. Steganalysis of compressed speech to detect covert voice over Internet protocol channels. IET Inform Secur, 2011, 5: 26–32
Huang Y, Tang S, Zhang Y. Detection of covert voice over Internet protocol communications using sliding window-based steganalysis. IET Commun, 2011, 5: 929–936
Huang Y F, Yuan J, Chen M C. Key distribution in the covert communication based on VoIP. Chinese J Electron, 2011, 20: 357–361
Liu Q Z, Sung A H, Qiao M Y. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE T Inform Forensics Secur, 2009, 4: 359–368
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, Y., Tang, S. Covert voice over internet protocol communications based on spatial model. Sci. China Technol. Sci. 59, 117–127 (2016). https://doi.org/10.1007/s11431-015-5955-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11431-015-5955-4