Skip to main content
Log in

Covert voice over internet protocol communications based on spatial model

  • Article
  • Published:
Science China Technological Sciences Aims and scope Submit manuscript

Abstract

This paper presents a new spatial steganography model for covert communications over voice over internet protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert VoIP communications. By taking into account the variation characteristics of VoIP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on VoIP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of VoIP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert VoIP communications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zander S, Armitage G, Branch P. Covert channels and countermeasures in computer network protocols. IEEE Commun Mag, 2007, 45: 136–142

    Article  Google Scholar 

  2. Luo X, Chan E W W, Chang R K C. TCP covert timing channels: Design and detection. In: Proc. of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Anchorage, Alaska, 2008. 420–429

    Google Scholar 

  3. Sellke S H, Wang C, Bagchi S, et al. TCP/IP timing channels: Theory to implementation. In: Proc. of 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, 2009. 2204–2212

    Google Scholar 

  4. Bai L Y, Huang Y, Hou G, et al. Covert channels based on Jitter field of the RTCP header. In: Proc. of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 1388–1391

    Google Scholar 

  5. Huang Y, Xiao B, Xiao H. Implementation of covert communication based on steganography. In: Proc. of 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 1512–1515

    Google Scholar 

  6. Aoki N. A technique of lossless steganography for G.711 telephony speech. In: Proc. of Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 608–611

    Google Scholar 

  7. Su Y, Huang Y, Li X. Steganography-oriented noisy resistance model of G.729a. In: Proc. of 2006 IMACS Multi-conference on Computational Engineering in Systems Applications, Beijing, China, 2006. 11–15

    Google Scholar 

  8. Liu L, Li M, Li Q, et al. Perceptually transparent information hiding in G.729 bitstream. In: Proc. of 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008. 406–409

    Google Scholar 

  9. Xiao B, Huang Y, Tang S. An approach to information hiding in low bit-rate speech stream. In: Proc. of IEEE Global Telecommunications, USA, 2008. 371–375

    Google Scholar 

  10. Mazurczyk W, Lubacz J. LACKa VoIP steganographic method. Telecommun Syst J, 2010, 45: 153–163

    Article  Google Scholar 

  11. Lubacz J, Mazurczyk W, Szczypiorski K. Principles and overview of network steganography. IEEE Commun Mag, 2014, 52, 225–229

    Article  Google Scholar 

  12. Druid. Real-time steganography with RTP. http://druid.caughq.org, 01 December 2011

  13. Kratzer C, Dittmann J, Vogel T, et al. Design and evaluation of steganography for Voice-over-IP. In: Proc. of 2006 IEEE International Symposium on Circuits and Systems, Island of Kos, Greece, 2006. 2397–2340

    Google Scholar 

  14. Cachin C. An information-theoretic model for steganography. Inform Comput, 2004, 192: 41–56

    Article  MathSciNet  MATH  Google Scholar 

  15. Bo X, Huang Y F. Reliable transmission of information hiding communication over stream-media. J Xidian Univ, 2008, 35: 554–558

    Google Scholar 

  16. Mazurczyk W, Kotulski Z. Covert channel for improving VoIP security. In: Proc. of 2006 Multi-conference on Advanced Computer Systems, Międzyzdroje, Poland, 2006. 311–320

    Google Scholar 

  17. Wang C, Wu Q. Information hiding in real-time VoIP streams. In: Proc. of 9th IEEE International Symposium on Multimedia, Taichung, Taiwan, 2007. 255–262

    Google Scholar 

  18. Huang Y F, Tang S, Yuan J. Steganography in inactive frames of VoIP streams encoded by source codec. IEEE T Inform Forensics Secur, 2011, 6: 296–306

    Article  Google Scholar 

  19. Li X, Yang B, Cheng D, et al. A generalization of LSB matching. IEEE Signal Proc Let, 2009, 16: 69–72

    Article  Google Scholar 

  20. Aoki N. A band extension technique for G.711 speech using steganography. IEICE T Commun, 2006, 89: 1896–1898

    Article  Google Scholar 

  21. Huang Y, Tang S, Bao C, et al. Steganalysis of compressed speech to detect covert voice over Internet protocol channels. IET Inform Secur, 2011, 5: 26–32

    Article  Google Scholar 

  22. Huang Y, Tang S, Zhang Y. Detection of covert voice over Internet protocol communications using sliding window-based steganalysis. IET Commun, 2011, 5: 929–936

    Article  Google Scholar 

  23. Huang Y F, Yuan J, Chen M C. Key distribution in the covert communication based on VoIP. Chinese J Electron, 2011, 20: 357–361

    Google Scholar 

  24. Liu Q Z, Sung A H, Qiao M Y. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis. IEEE T Inform Forensics Secur, 2009, 4: 359–368

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to ShanYu Tang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, Y., Tang, S. Covert voice over internet protocol communications based on spatial model. Sci. China Technol. Sci. 59, 117–127 (2016). https://doi.org/10.1007/s11431-015-5955-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11431-015-5955-4

Keywords

Navigation