Using Signature for Hidden Communication Prevention in IP Telephony

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 325)


This paper prevents the steganographic method for IP telephony called transcoding steganography (TranSteg). Typically, in TranSteg, it is the overt data that is to compress to make space for steganogram. TranSteg finds appropriate codec that will result in the voice quality similar to the original. In signature-based system, the signature of the voice payload is appended to the packet to provide integrity. The signature of the data becomes invalid when there is some change in voice data. This method detects the hidden communication between a VoIP call. The signature-based scheme concept is described in this paper.


Voice over IP Network steganography Hidden communication Data hiding 


  1. 1.
    W. Mazurczyk, P. Szaga, K. Szczypiorski, Using transcoding for hidden communication in IP telephony. Multimedia Tools Appl. 1–27 (2011)Google Scholar
  2. 2.
    A. Naofumi, VoIP packet loss concealment based on two-side pitch waveform replication technique using steganography, in 2004 IEEE Region 10 Conference TENCON 2004, vol. 100 (2004)Google Scholar
  3. 3.
    K. Ahsan, D. Kundur, Practical data hiding in TCP/IP, in Proceedings of Workshop on Multimedia Security at ACM Multimedia 2002 (2002)Google Scholar
  4. 4.
    J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, vol 5681 (2005), pp. 607–618Google Scholar
  5. 5.
    C. Krätzer, J. Dittmann, T. Vogel, R. Hillert, Design and evaluation of steganography for voice-over-IP, in Proceedings of IEEE International Symposium on Circuits and Systems, (ISCAS) (2006)Google Scholar
  6. 6.
    C. Wang, W. Wu, Information hiding in real-time VoIP streams, in Ninth IEEE International Symposium on Multimedia (ISM 2007) (2007) pp. 255–262Google Scholar
  7. 7.
    T. Takahashi, W. Lee, An assessment of VoIP covert channel threats, in Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (2007)Google Scholar
  8. 8.
    N. Aoki, A technique of lossless steganography for G.711 telephony speech, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008) (2008) pp. 608–611Google Scholar
  9. 9.
    K.W. Mazurczy, Z. Kotulski, New security and control protocol for VoIP based on steganography and digital watermarking, in Proceedings of 5th International Conference on Computer ScienceResearch and Applications (IBIZA 2006) (2006)Google Scholar
  10. 10.
    K. Mazurczy, S. Szczypiorski, Steganography of VoIP streams, in Proceedings of on the Move Federated Conferences and Workshops. The 3rd International Symposium on Information Security (IS’08) (2008), pp. 1001–1018Google Scholar
  11. 11.
    L.Y. Bai, Y. Huang, G. Hou, B. Xiao, Covert channels based on jitter field of the RTCP header, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008)Google Scholar
  12. 12.
    A. Plies, M. Massoth, R. Marx, Approach to identity card-based voice-over-IP authentication. 2010 Second International Conferences on Advances in Multimedia (MMEDIA). IEEE (2010)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.TIFAC Core in Cyber SecurityAmritha Vishwa VidyapeethamCoimbatoreIndia

Personalised recommendations