Skip to main content

Using Signature for Hidden Communication Prevention in IP Telephony

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 325))

Abstract

This paper prevents the steganographic method for IP telephony called transcoding steganography (TranSteg). Typically, in TranSteg, it is the overt data that is to compress to make space for steganogram. TranSteg finds appropriate codec that will result in the voice quality similar to the original. In signature-based system, the signature of the voice payload is appended to the packet to provide integrity. The signature of the data becomes invalid when there is some change in voice data. This method detects the hidden communication between a VoIP call. The signature-based scheme concept is described in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. W. Mazurczyk, P. Szaga, K. Szczypiorski, Using transcoding for hidden communication in IP telephony. Multimedia Tools Appl. 1–27 (2011)

    Google Scholar 

  2. A. Naofumi, VoIP packet loss concealment based on two-side pitch waveform replication technique using steganography, in 2004 IEEE Region 10 Conference TENCON 2004, vol. 100 (2004)

    Google Scholar 

  3. K. Ahsan, D. Kundur, Practical data hiding in TCP/IP, in Proceedings of Workshop on Multimedia Security at ACM Multimedia 2002 (2002)

    Google Scholar 

  4. J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, vol 5681 (2005), pp. 607–618

    Google Scholar 

  5. C. Krätzer, J. Dittmann, T. Vogel, R. Hillert, Design and evaluation of steganography for voice-over-IP, in Proceedings of IEEE International Symposium on Circuits and Systems, (ISCAS) (2006)

    Google Scholar 

  6. C. Wang, W. Wu, Information hiding in real-time VoIP streams, in Ninth IEEE International Symposium on Multimedia (ISM 2007) (2007) pp. 255–262

    Google Scholar 

  7. T. Takahashi, W. Lee, An assessment of VoIP covert channel threats, in Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (2007)

    Google Scholar 

  8. N. Aoki, A technique of lossless steganography for G.711 telephony speech, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008) (2008) pp. 608–611

    Google Scholar 

  9. K.W. Mazurczy, Z. Kotulski, New security and control protocol for VoIP based on steganography and digital watermarking, in Proceedings of 5th International Conference on Computer Science—Research and Applications (IBIZA 2006) (2006)

    Google Scholar 

  10. K. Mazurczy, S. Szczypiorski, Steganography of VoIP streams, in Proceedings of on the Move Federated Conferences and Workshops. The 3rd International Symposium on Information Security (IS’08) (2008), pp. 1001–1018

    Google Scholar 

  11. L.Y. Bai, Y. Huang, G. Hou, B. Xiao, Covert channels based on jitter field of the RTCP header, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008)

    Google Scholar 

  12. A. Plies, M. Massoth, R. Marx, Approach to identity card-based voice-over-IP authentication. 2010 Second International Conferences on Advances in Multimedia (MMEDIA). IEEE (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajvad Rahman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Rahman, A., Amritha, P.P. (2015). Using Signature for Hidden Communication Prevention in IP Telephony. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 325. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2135-7_52

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2135-7_52

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2134-0

  • Online ISBN: 978-81-322-2135-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics