scispace - formally typeset
Search or ask a question
Journal ArticleDOI

VoIP Steganography Methods, a Survey

01 Mar 2019-Cybernetics and Information Technologies (Sciendo)-Vol. 19, Iss: 1, pp 73-87
TL;DR: This paper focuses on data hiding methods that uses VoIP as a carrier and analyzes the performance of the algorithms using the three metrics undetectability, bandwidth and robustness.
Abstract: Abstract Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred than cryptography to achieve undetectability. Steganography hides the secret data inside the other file such as text, audio, video, so that the existence of the secret data is completely hidden. Recent research focuses much on utilizing Voice over Internet Protocol (VoIP) calls as a carrier for data hiding. VoIP calls are much preferred among internet users for its wide availability, dynamic time limit and low cost. This paper focuses on data hiding methods that uses VoIP as a carrier. The paper also analyzes the performance of the algorithms using the three metrics undetectability, bandwidth and robustness.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
03 Feb 2021-Sensors
TL;DR: In this paper, the authors classified recent research results of steganography and steganalysis based on protocol and voice payload, and also summarized their characteristics, advantages, and disadvantages.
Abstract: The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. Therefore, in recent years, steganography and steganography analysis based on VoIP have gradually become research hotspots in the field of information security. Steganography and steganalysis based on VoIP can be divided into two categories, depending on where the secret information is embedded: steganography and steganalysis based on voice payload or protocol. The former mainly regards voice payload as the carrier, and steganography or steganalysis is performed with respect to the payload. It can be subdivided into steganography and steganalysis based on FBC (fixed codebook), LPC (linear prediction coefficient), and ACB (adaptive codebook). The latter uses various protocols as the carrier and performs steganography or steganalysis with respect to some fields of the protocol header and the timing of the voice packet. It can be divided into steganography and steganalysis based on the network layer, the transport layer, and the application layer. Recent research results of steganography and steganalysis based on protocol and voice payload are classified in this paper, and the paper also summarizes their characteristics, advantages, and disadvantages. The development direction of future research is analyzed. Therefore, this research can provide good help and guidance for researchers in related fields.

8 citations

References
More filters
Journal ArticleDOI
TL;DR: Current digital audio steganographic techniques are reviewed and evaluated based on robustness, security and hiding capacity indicators and a robustness-based classification of steganography models depending on their occurrence in the embedding process is provided.
Abstract: The rapid spread in digital data usage in many real life applications have urged new and effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by implementing steganograhy techniques. Novel and versatile audio steganographic methods have been proposed. The goal of steganographic systems is to obtain secure and robust way to conceal high rate of secret data. We focus in this paper on digital audio steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital audio steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. Another contribution of this paper is the provision of a robustness-based classification of steganographic models depending on their occurrence in the embedding process. A survey of major trends of audio steganography applications is also discussed in this paper.

175 citations

Journal ArticleDOI
TL;DR: A survey of the existing VoIP steganography methods and their countermeasures can be found in this article, where the authors present a first survey of these methods and countermeasures.
Abstract: Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic methods are usually aimed at hiding the very existence of the communication. Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect carrier for steganographic purposes. This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.

98 citations

Journal ArticleDOI
TL;DR: The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography), which aims to find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected.
Abstract: The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt data that is compressed to make space for the steganogram. The main innovation of TranSteg is to, for a chosen voice stream, find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected. Then, the voice stream is transcoded. At this step the original voice payload size is intentionally unaltered and the change of the codec is not indicated. Instead, after placing the transcoded voice payload, the remaining free space is filled with hidden data. TranSteg proof of concept implementation was designed and developed. The obtained experimental results are enclosed in this paper. They prove that the proposed method is feasible and offers a high steganographic bandwidth while introducing small voice degradation. Moreover, TranSteg detection is difficult to perform when compared with existing VoIP steganography methods.

96 citations

Journal ArticleDOI
TL;DR: The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’'s impact on quality of voice transmission and its resistance to steganalysis.
Abstract: The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK's hidden data insertion procedure on the method's impact on quality of voice transmission and its resistance to steganalysis.

77 citations

Posted Content
TL;DR: This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.
Abstract: Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to secret information into a carrier message. Steganographic methods are usually aimed at hiding the very existence of the communication. Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect carrier for steganographic purposes. This paper is a survey of the existing VoIP steganography (steganophony) methods and their countermeasures.

70 citations