Skip to main content
Log in

A novel steganography approach for voice over IP

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In homeland defense and security, secure data transfer is still critical challenging due to the open nature of Internet. One of the solutions which came to the rescue is the VoIP (Voice over IP) steganography. VoIP is unquestionably the most popular real-time service in IP networks today. To date, existing VoIP steganography research commonly focus on information hiding in the LSB bits of network audio streams. However, this approach may raise serious security threat, where the hidden information may be easily removed, detected and attacked. Towards this issue, we propose AVIS, a novel Adaptive VoIP steganography approach to hide information within network audio streams. AVIS consists of three parts, named VAMI, VADDI and VODO. VAMI works by dynamically selecting multiple bits based on the VoIP vector value, VADDI dynamically changes embedding intervals to avoid detection and attacking, and VODO try to change the neighbor bits to offset the sound distortion. Also, we evaluate the effectiveness of this approach with G.711 as the codec of the cover speech in Linphone, a famous open-source VoIP software. The experimental results demonstrate that our approach provides better performance than the traditional one.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  • Aoki N (2003) A packet loss concealment technique for voip using steganography based on pitch waveform replication. IEICE Trans Commun 86(12):2551–2560

    Google Scholar 

  • Bailey K, Curran K (2006) An evaluation of image based steganography methods. Multimedia Tools Appl 30(1):55–88

    Article  Google Scholar 

  • Castiglione A, Cattaneo G, De Santis A, Petagna F, Petrillo UF (2006) Speech: Secure personal end-to-end communication with handheld. In: ISSE 2006 Securing Electronic Busines Processes. Springer, pp 287–297

  • Castiglione A, D’Alessio B, De Santis A (2011a) Steganography and secure communication on online social networks and online photo sharing. In: International Conference on Broadband and wireless computing, communication and applications (BWCCA), 2011. IEEE, pp 363–368

  • Castiglione A, DAlessio B, De Santis A, Palmieri F (2011b) New steganographic techniques for the ooxml file format. In: Availability, reliability and security for business, enterprise and health information systems. Springer, pp 344–358

  • Castiglione A, De Santis A, Fiore U, Palmieri F (2011c) E-mail-based covert channels for asynchronous message steganography. In: Fifth International Conference on innovative mobile and internet services in ubiquitous computing (IMIS), 2011. IEEE, pp 503–508

  • Castiglione A, Cattaneo G, Cembalo M, De Santis A, Faruolo P, Petagna F, Petrillo UF (2012) Engineering a secure mobile messaging framework. Comput Security 31(6):771–781

    Article  Google Scholar 

  • Castiglione A, De Santis A, Fiore U, Palmieri F (2012) An asynchronous covert channel using spam. Comput Math Appl 63(2):437–447

    Article  Google Scholar 

  • Dittmann J, Hesse D (2004) Network based intrusion detection to detect steganographic communication channels: on the example of audio data. In: IEEE 6th Workshop on multimedia signal processing, 2004. IEEE, pp 343–346

  • Dittmann J, Hesse D, Hillert R (2005) Steganography and steganalysis in voice-over ip scenarios: operational aspects and first experiences with a new steganalysis tool set. In: Electronic Imaging 2005. International Society for Optics and Photonics, pp 607–618

  • Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  Google Scholar 

  • Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  Google Scholar 

  • Grothoff C, Grothoff K, Alkhutova L, Stutsman R, Atallah M (2005) Translation-based steganography. In: Information hiding. Springer, pp 219–233

  • Harada N, Kamamoto Y, Moriya T, Hiwasaki Y, Ramalho MA, Netsch L, Stachurski J, Miao L, Taddei H, Qi F (2010) Emerging itu-t standard g. 711.0lossless compression of g. 711 pulse code modulation. In: IEEE International Conference on acoustics speech and signal processing (ICASSP), 2010. IEEE, pp 4658–4661

  • Kratzer C, Dittmann J, Vogel T, Hillert R (2006) Design and evaluation of steganography for voice-over-ip. In: IEEE International Symposium on circuits and systems, 2006. ISCAS 2006 Proceedings. IEEE

  • Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Trans Inf Forensics Security 5(2):201–214

    Article  MathSciNet  Google Scholar 

  • Mazurczyk W, Szczypiorski K (2008) Steganography of voip streams. In: On the move to meaningful internet systems: OTM 2008. Springer, pp 1001–1018

  • Mazurczyk W, Karas M, Szczypiorski K (2013) Skyde: a skype-based steganographic method. arXiv preprint arXiv:1301.3632

  • Neal H, ElAarag H (2013) Performance analysis of current data hiding algorithms for voip. In: Proceedings of the 16th communications and networking symposium. Society for Computer Simulation International 7

  • ITU-T P.800.1 (2006) Mean opinion score (mos) terminology

  • ITU-T P.862 (2001) Perceptual evaluation of speech quality (pesq): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs

  • Palmieri F, Fiore U (2009) Providing true end-to-end security in converged voice over ip infrastructures. Comput Security 28(6):433–449

    Article  Google Scholar 

  • Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security Privacy 1(3):32–44

    Article  Google Scholar 

  • Shirali-Shahreza M (2006) A new method for real-time steganography. In: 8th International Conference on signal processing, 2006, vol 4. IEEE

  • Tian H, Zhou K, Huang Y, Feng D, Liu J (2008) A covert communication model based on least significant bits steganography in voice over ip. In: The 9th International Conference for Young Computer Scientists, 2008. ICYCS 2008. IEEE, pp 647–652

  • Tian H, Zhou K, Jiang H, Feng D (2009a) Digital logic based encoding strategies for steganography on voice-over-ip. In: Proceedings of the 17th ACM international conference on Multimedia. ACM, pp 777–780

  • Tian H, Zhou K, Jiang H, Liu J, Huang Y, Feng D (2009b) An m-sequence based steganography model for voice over ip. In: IEEE International Conference on Communications, 2009. ICC’09. IEEE, pp 1–5

  • Tian H, Zhou K, Jiang H, Liu J, Huang Y, Feng D (2009c) An m-sequence based steganography model for voice over ip. In: IEEE International Conference on communications, 2009. ICC’09. IEEE, pp 1–5

  • Wang C, Wu Q (2007a) Information hiding in real-time voip streams. In: Ninth IEEE International Symposium on Multimedia, 2007. ISM 2007. IEEE, pp 255–262

  • Wang C, Wu Q (2007b) Information hiding in real-time voip streams. In: Ninth IEEE International Symposium on Multimedia, 2007. ISM 2007. IEEE, pp 255–262

  • Wu Z, Yang W (2006) G. 711-based adaptive speech information hiding approach. In: Intelligent computing. Springer, pp 1139–1144

Download references

Acknowledgments

The work described in this paper is partially supported by the grants of the National Basic Research Program of China (973 project) under Grant No. 2009CB 320503, 2012CB 315906; the project of National Science Foundation of China under grant No. 61070199, 61103189, 61103194, 61103182, 61202488, 61272482; the National High Technology Research and Development Program of China (863 Program) No. 2011AA01A103, 2012AA01A506, 2013AA013505, the Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20114307110006, 20124307120032, the program for Changjiang Scholars and Innovative Research Team in University (No. IRT1012) and Hunan Province Natural Science Foundation of China (11JJ7003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baokang Zhao.

Additional information

Part of this work has been appeared in the conference proceedings of NBiS 2011.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wei, Z., Zhao, B., Liu, B. et al. A novel steganography approach for voice over IP. J Ambient Intell Human Comput 5, 601–610 (2014). https://doi.org/10.1007/s12652-013-0212-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-013-0212-9

Keywords

Navigation