Skip to main content
Log in

Dynamic matrix encoding strategy for voice-over-IP steganography

  • Published:
Journal of Central South University of Technology Aims and scope Submit manuscript

Abstract

In order to optionally regulate embedding capacity and embedding transparency according to user’s requirements in voice-over-IP (VoIP) steganography, a dynamic matrix encoding strategy (DMES) was presented. Differing from the traditional matrix encoding strategy, DMES dynamically chose the size of each message group in a given set of adoptable message sizes. The appearance possibilities of all adoptable sizes were set in accordance with the desired embedding performance (embedding rate or bit-change rate). Accordingly, a searching algorithm that could provide an optimal combination of appearance possibilities was proposed. Furthermore, the roulette wheel algorithm was employed to determine the size of each message group according to the optimal combination of appearance possibilities. The effectiveness of DMES was evaluated in StegVoIP, which is a typical covert communication system based on VoIP. The experimental results demonstrate that DMES can adjust embedding capacity and embedding transparency effectively and flexibly, and achieve the desired embedding performance in any case. For the desired embedding rate, the average errors are not more than 0.000 8, and the standard deviations are not more than 0.002 0; for the desired bit-change rate, the average errors are not more than 0.001 4, and the standard deviations are not more than 0.002 6.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. ZHU Cong-xu, CHEN Zhi-gang. A novel spatial domain digital watermarking algorithm based on chaotic map [J]. Journal of Central South University of Technology: Science and Technology, 2005, 36(2): 272–276. (in Chinese)

    Article  Google Scholar 

  2. BADURA S, RYMASZEWSKI S. Transform domain steganography in DVD video and audio content [C]// Proceedings of the 2007 IEEE International Workshop on Imaging Systems and Techniques. Los Alamitos: IEEE, 2007: 1–5.

    Chapter  Google Scholar 

  3. POOYAN M, DELFOROUZI A. LSB-based audio steganography method based on lifting wavelet transform [C]// Proceedings of the 2007 IEEE International Symposium on Signal Processing and Information Technology. Los Alamitos: IEEE, 2007: 600–603.

    Chapter  Google Scholar 

  4. LIU Yu-ling, SUN Xing-ming, GAN Can, WANG Hong. An efficient linguistic steganography for Chinese text [C]// Proceedings of the 2007 IEEE International Conference on Multimedia and Expo (ICME’07). Los Alamitos: IEEE, 2007: 2094–2097.

    Google Scholar 

  5. GOODE B. Voice over Internet protocol (VoIP) [J]. Proceedings of the IEEE, 2002, 90(9): 1495–1517.

    Article  Google Scholar 

  6. WANG C, WU Q. Information hiding in real-time VoIP streams [C]// Proceedings of the 9th IEEE International Symposium on Multimedia. Washington: IEEE Computer Society, 2007: 255–262.

    Chapter  Google Scholar 

  7. DITTMANN J, HESSE D, HILLERT R. Steganography and steganalysis in voice over IP scenarios: Operational aspects and first experiences with a new steganalysis tool set [C]// Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII. Bellingham: SPIE, 2005: 607–618.

    Google Scholar 

  8. KRATZER C, DITTMANN J, VOGEL T, HILLERT R. Design and evaluation of steganography for voice-over-IP [C]// Proceedings of the 2006 IEEE International Symposium on Circuits and Systems (ISACAS’06). Piscataway: IEEE Circuits and Systems Society, 2006: 2397–2340.

    Google Scholar 

  9. HUANG Yong-feng, XIAO Bo, XIAO Hong-hua. Implementation of covert communication based on steganography [C]// Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP’08). Washington: IEEE Computer Society, 2008: 1512–1515.

    Chapter  Google Scholar 

  10. TIAN Hui, ZHOU Ke, HUANG Yong-feng, LIU Jin, FENG Dan. A covert communication model based on least significant bits steganography in Voice over IP [C]// Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS’08). Washington: IEEE Computer Society, 2008: 647–652.

    Chapter  Google Scholar 

  11. AOKI N. A technique of lossless steganography for G.711 telephony speech [C]// Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP’08). Washington: IEEE Computer Society, 2008: 608–611.

    Chapter  Google Scholar 

  12. MAZURCZYK W, LUBACZ J. Steganography of VoIP streams [C]// Proceedings of the 3rd International Symposium on Information Security. Berlin: Springer, 2008: 1001–1018.

    Google Scholar 

  13. TIAN Hui, ZHOU Ke, JIANG Hong, HUANG Yong-feng, LIU Jin, FENG Dan. An adaptive steganography scheme for Voice over IP [C]// Proceedings of the 2009 IEEE International Symposium on Circuits and Systems (ISACAS’09). Piscataway: IEEE Circuits and Systems Society, 2009: 2922–2925.

    Chapter  Google Scholar 

  14. TIAN Hui, ZHOU Ke, JIANG Hong, LIU Jin, HUANG Yong-feng, FENG Dan. An m-sequence based steganography model for Voice over IP [C]// Proceedings of the 2009 IEEE International Conference on Communications (ICC’09). Los Alamitos: IEEE, 2009: 1–5.

    Chapter  Google Scholar 

  15. XIAO Bo, HUANG Yong-feng, TANG Shan-yu. An approach to information hiding in low bit-rate speech stream [C]// Proceedings of the 2008 Global Telecommunications Conference (GLOBECOM’08). Los Alamitos: IEEE, 2008: 1–5.

    Chapter  Google Scholar 

  16. MÖLLER S, PFITZMANN A, STIRAND I. Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best [C]// Proceedings of the 1st International Workshop on Information Hiding. Berlin: Springer, 1996: 7–21.

    Google Scholar 

  17. BAI Seng, HU Zhong-yu, WU Le-hua, ZHOU Dao-hua. Steganography of telecommunication information [M]. Beijing: National Defense Industry Press, 2005: 201–202. (in Chinese)

    Google Scholar 

  18. TSENG Y, CHEN Y, PAN H. A secure data hiding scheme for binary images [J]. IEEE Transactions on Communications, 2002, 50(8): 1227–1231.

    Article  Google Scholar 

  19. CRANDALL R. Some notes on steganography [EB/OL]. [2009-12-01]. http://os.inf.tu-dresden.de/~westfeld/crandall.pdf.

  20. WESTFELD A. F5—A steganographic algorithm [C]// Proceedings of the 4th International Workshop on Information Hiding. Berlin: Springer, 2001: 289–302.

    Google Scholar 

  21. FRIDRICH J, SOUKAL D. Matrix embedding for large payloads [J]. IEEE Transactions on Information Security and Forensics, 2006, 1(3): 390–394.

    Article  Google Scholar 

  22. KHATIRINEJAD M, LISONĚK P. Linear codes for high payload steganography [J]. Discrete Applied Mathematics, 2009, 157: 971–981.

    Article  MATH  MathSciNet  Google Scholar 

  23. MATSUMOTO M, NISHIMURA T. Mersenne twister: A 623-dimensionally equidistributed uniform pseudorandom number generator [J]. ACM Transactions on Modeling and Computer Simulations: Special Issue on Uniform Random Number Generation, 1998, 8(1): 3–30.

    MATH  Google Scholar 

  24. An introduction of Huazhong university of science and technology [EB/OL]. [2009-12-08]. http://english.hust.edu.cn/about_overview.html.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ke Zhou  (周可).

Additional information

Foundation item: Project(2009AA01A402) supported by the National High-Tech Research and Development Program of China; Project(NCET-06-0650) supported by Program for New Century Excellent Talents in University; Project(IRT-0725) supported by Program for Changjiang Scholars and Innovative Research Team in Chinese University

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tian, H., Zhou, K. & Feng, D. Dynamic matrix encoding strategy for voice-over-IP steganography. J. Cent. South Univ. Technol. 17, 1285–1292 (2010). https://doi.org/10.1007/s11771-010-0633-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-010-0633-y

Key words

Navigation