Abstract
This paper prevents the steganographic method for IP telephony called transcoding steganography (TranSteg). Typically, in TranSteg, it is the overt data that is to compress to make space for steganogram. TranSteg finds appropriate codec that will result in the voice quality similar to the original. In signature-based system, the signature of the voice payload is appended to the packet to provide integrity. The signature of the data becomes invalid when there is some change in voice data. This method detects the hidden communication between a VoIP call. The signature-based scheme concept is described in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
W. Mazurczyk, P. Szaga, K. Szczypiorski, Using transcoding for hidden communication in IP telephony. Multimedia Tools Appl. 1–27 (2011)
A. Naofumi, VoIP packet loss concealment based on two-side pitch waveform replication technique using steganography, in 2004 IEEE Region 10 Conference TENCON 2004, vol. 100 (2004)
K. Ahsan, D. Kundur, Practical data hiding in TCP/IP, in Proceedings of Workshop on Multimedia Security at ACM Multimedia 2002 (2002)
J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, vol 5681 (2005), pp. 607–618
C. Krätzer, J. Dittmann, T. Vogel, R. Hillert, Design and evaluation of steganography for voice-over-IP, in Proceedings of IEEE International Symposium on Circuits and Systems, (ISCAS) (2006)
C. Wang, W. Wu, Information hiding in real-time VoIP streams, in Ninth IEEE International Symposium on Multimedia (ISM 2007) (2007) pp. 255–262
T. Takahashi, W. Lee, An assessment of VoIP covert channel threats, in Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (2007)
N. Aoki, A technique of lossless steganography for G.711 telephony speech, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008) (2008) pp. 608–611
K.W. Mazurczy, Z. Kotulski, New security and control protocol for VoIP based on steganography and digital watermarking, in Proceedings of 5th International Conference on Computer Science—Research and Applications (IBIZA 2006) (2006)
K. Mazurczy, S. Szczypiorski, Steganography of VoIP streams, in Proceedings of on the Move Federated Conferences and Workshops. The 3rd International Symposium on Information Security (IS’08) (2008), pp. 1001–1018
L.Y. Bai, Y. Huang, G. Hou, B. Xiao, Covert channels based on jitter field of the RTCP header, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008)
A. Plies, M. Massoth, R. Marx, Approach to identity card-based voice-over-IP authentication. 2010 Second International Conferences on Advances in Multimedia (MMEDIA). IEEE (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Rahman, A., Amritha, P.P. (2015). Using Signature for Hidden Communication Prevention in IP Telephony. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 325. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2135-7_52
Download citation
DOI: https://doi.org/10.1007/978-81-322-2135-7_52
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2134-0
Online ISBN: 978-81-322-2135-7
eBook Packages: EngineeringEngineering (R0)