A Model for the Effective Steganalysis of VoIP

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 325)

Abstract

The latest studies and applications in steganography are based on Internet, particularly voice over IP (VoIP). VoIP has proved itself to be a perfect carrier for hidden data. Most of the approaches for VoIP steganalysis focus on detecting hidden data in the payload of the packets, by extending audio steganalysis methods. Here, we propose an effective steganalysis method which considers the speech behavior as well as network protocol structure to detect hidden communication. The common statistical features, like mean, covariance, etc., are also considered for effective classification.

Keywords

LSB embedding VoIP Steganalysis MFCC Statistical SVM GMM 

References

  1. 1.
    T. Takahashi, W. Lee, An assessment of VoIP covert channel threats, in Security and Privacy in Communications Networks and the Workshops. Third International Conference on IEEE (2007), pp. 371–380Google Scholar
  2. 2.
    W. Mazurczyk, VoIP steganography and its detection—a survey. ACM Comput. Surv. (CSUR) 46(2), 20 (2013)Google Scholar
  3. 3.
    C.J. Burges, A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Disc. 2(2), 121–167 (1998)CrossRefGoogle Scholar
  4. 4.
    F.G. Mohammadi, M.S. Abadeh, A survey of data mining techniques for steganalysis, in Recent Advances in Steganography (2012), pp. 1–25Google Scholar
  5. 5.
    C. Kraetzer, J. Dittmann, Mel-cepstrum-based steganalysis for VoIP steganography, in Electronic Imaging (2007), p. 650505Google Scholar
  6. 6.
    A. Janicki, W. Mazurczyk, K. Szczypiorski, Steganalysis of transcoding steganography, in Annals of telecommunications (2012), pp. 1–12Google Scholar
  7. 7.
    W. Mazurczyk, P. Szaga, K. Szczypiorski, Using transcoding for hidden communication in IP telephony, in Multimedia Tools Applications (2012), pp. 1–27Google Scholar
  8. 8.
  9. 9.
    C.C. Chang, C.J. Lin, LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST). 2(3), 27 (2011)Google Scholar
  10. 10.
    Y. Huang, S. Tang, C. Bao, Y.J. Yip, Steganalysis of compressed speech to detect covert voice over Internet protocol channels. Inf. Secur. IET. 5(1), 26–32 (2011)CrossRefGoogle Scholar
  11. 11.
    W. Mazurczyk, K. Szczypiorski, Steganography of VoIP streams, in On the Move to Meaningful Internet Systems: OTM, ed. by R. Meersman, Z. Tari (Springer, Berlin, 2008), pp. 1001–1018Google Scholar
  12. 12.
    J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in Electronic Imaging (2005), pp. 607–618Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Tifac Core in Cyber SecurityAmrita Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations