Abstract
In order to optionally regulate embedding capacity and embedding transparency according to user’s requirements in voice-over-IP (VoIP) steganography, a dynamic matrix encoding strategy (DMES) was presented. Differing from the traditional matrix encoding strategy, DMES dynamically chose the size of each message group in a given set of adoptable message sizes. The appearance possibilities of all adoptable sizes were set in accordance with the desired embedding performance (embedding rate or bit-change rate). Accordingly, a searching algorithm that could provide an optimal combination of appearance possibilities was proposed. Furthermore, the roulette wheel algorithm was employed to determine the size of each message group according to the optimal combination of appearance possibilities. The effectiveness of DMES was evaluated in StegVoIP, which is a typical covert communication system based on VoIP. The experimental results demonstrate that DMES can adjust embedding capacity and embedding transparency effectively and flexibly, and achieve the desired embedding performance in any case. For the desired embedding rate, the average errors are not more than 0.000 8, and the standard deviations are not more than 0.002 0; for the desired bit-change rate, the average errors are not more than 0.001 4, and the standard deviations are not more than 0.002 6.
Similar content being viewed by others
References
ZHU Cong-xu, CHEN Zhi-gang. A novel spatial domain digital watermarking algorithm based on chaotic map [J]. Journal of Central South University of Technology: Science and Technology, 2005, 36(2): 272–276. (in Chinese)
BADURA S, RYMASZEWSKI S. Transform domain steganography in DVD video and audio content [C]// Proceedings of the 2007 IEEE International Workshop on Imaging Systems and Techniques. Los Alamitos: IEEE, 2007: 1–5.
POOYAN M, DELFOROUZI A. LSB-based audio steganography method based on lifting wavelet transform [C]// Proceedings of the 2007 IEEE International Symposium on Signal Processing and Information Technology. Los Alamitos: IEEE, 2007: 600–603.
LIU Yu-ling, SUN Xing-ming, GAN Can, WANG Hong. An efficient linguistic steganography for Chinese text [C]// Proceedings of the 2007 IEEE International Conference on Multimedia and Expo (ICME’07). Los Alamitos: IEEE, 2007: 2094–2097.
GOODE B. Voice over Internet protocol (VoIP) [J]. Proceedings of the IEEE, 2002, 90(9): 1495–1517.
WANG C, WU Q. Information hiding in real-time VoIP streams [C]// Proceedings of the 9th IEEE International Symposium on Multimedia. Washington: IEEE Computer Society, 2007: 255–262.
DITTMANN J, HESSE D, HILLERT R. Steganography and steganalysis in voice over IP scenarios: Operational aspects and first experiences with a new steganalysis tool set [C]// Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII. Bellingham: SPIE, 2005: 607–618.
KRATZER C, DITTMANN J, VOGEL T, HILLERT R. Design and evaluation of steganography for voice-over-IP [C]// Proceedings of the 2006 IEEE International Symposium on Circuits and Systems (ISACAS’06). Piscataway: IEEE Circuits and Systems Society, 2006: 2397–2340.
HUANG Yong-feng, XIAO Bo, XIAO Hong-hua. Implementation of covert communication based on steganography [C]// Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP’08). Washington: IEEE Computer Society, 2008: 1512–1515.
TIAN Hui, ZHOU Ke, HUANG Yong-feng, LIU Jin, FENG Dan. A covert communication model based on least significant bits steganography in Voice over IP [C]// Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS’08). Washington: IEEE Computer Society, 2008: 647–652.
AOKI N. A technique of lossless steganography for G.711 telephony speech [C]// Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP’08). Washington: IEEE Computer Society, 2008: 608–611.
MAZURCZYK W, LUBACZ J. Steganography of VoIP streams [C]// Proceedings of the 3rd International Symposium on Information Security. Berlin: Springer, 2008: 1001–1018.
TIAN Hui, ZHOU Ke, JIANG Hong, HUANG Yong-feng, LIU Jin, FENG Dan. An adaptive steganography scheme for Voice over IP [C]// Proceedings of the 2009 IEEE International Symposium on Circuits and Systems (ISACAS’09). Piscataway: IEEE Circuits and Systems Society, 2009: 2922–2925.
TIAN Hui, ZHOU Ke, JIANG Hong, LIU Jin, HUANG Yong-feng, FENG Dan. An m-sequence based steganography model for Voice over IP [C]// Proceedings of the 2009 IEEE International Conference on Communications (ICC’09). Los Alamitos: IEEE, 2009: 1–5.
XIAO Bo, HUANG Yong-feng, TANG Shan-yu. An approach to information hiding in low bit-rate speech stream [C]// Proceedings of the 2008 Global Telecommunications Conference (GLOBECOM’08). Los Alamitos: IEEE, 2008: 1–5.
MÖLLER S, PFITZMANN A, STIRAND I. Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best [C]// Proceedings of the 1st International Workshop on Information Hiding. Berlin: Springer, 1996: 7–21.
BAI Seng, HU Zhong-yu, WU Le-hua, ZHOU Dao-hua. Steganography of telecommunication information [M]. Beijing: National Defense Industry Press, 2005: 201–202. (in Chinese)
TSENG Y, CHEN Y, PAN H. A secure data hiding scheme for binary images [J]. IEEE Transactions on Communications, 2002, 50(8): 1227–1231.
CRANDALL R. Some notes on steganography [EB/OL]. [2009-12-01]. http://os.inf.tu-dresden.de/~westfeld/crandall.pdf.
WESTFELD A. F5—A steganographic algorithm [C]// Proceedings of the 4th International Workshop on Information Hiding. Berlin: Springer, 2001: 289–302.
FRIDRICH J, SOUKAL D. Matrix embedding for large payloads [J]. IEEE Transactions on Information Security and Forensics, 2006, 1(3): 390–394.
KHATIRINEJAD M, LISONĚK P. Linear codes for high payload steganography [J]. Discrete Applied Mathematics, 2009, 157: 971–981.
MATSUMOTO M, NISHIMURA T. Mersenne twister: A 623-dimensionally equidistributed uniform pseudorandom number generator [J]. ACM Transactions on Modeling and Computer Simulations: Special Issue on Uniform Random Number Generation, 1998, 8(1): 3–30.
An introduction of Huazhong university of science and technology [EB/OL]. [2009-12-08]. http://english.hust.edu.cn/about_overview.html.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Project(2009AA01A402) supported by the National High-Tech Research and Development Program of China; Project(NCET-06-0650) supported by Program for New Century Excellent Talents in University; Project(IRT-0725) supported by Program for Changjiang Scholars and Innovative Research Team in Chinese University
Rights and permissions
About this article
Cite this article
Tian, H., Zhou, K. & Feng, D. Dynamic matrix encoding strategy for voice-over-IP steganography. J. Cent. South Univ. Technol. 17, 1285–1292 (2010). https://doi.org/10.1007/s11771-010-0633-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11771-010-0633-y