Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
An evaluation of image based steganography methods
Multimedia Tools and Applications
Information Hiding in Real-Time VoIP Streams
ISM '07 Proceedings of the Ninth IEEE International Symposium on Multimedia
Implementation of Covert Communication Based on Steganography
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
An M-sequence based steganography model for voice over IP
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
State-based steganography in low bit rate speech
Proceedings of the 20th ACM international conference on Multimedia
Hi-index | 0.00 |
This paper presents three encoding strategies based on digital logic for steganography on Voice over IP (VoIP), which aim to enhance the embedding transparency. Differing from previous approaches, our strategies reduce the embedding distortion by improving the similarity between the cover and the covert message using digital logical transformations, instead of reducing the amount of the substitution bits. Therefore, by contrast, our strategies will improve the embedding transparency without sacrificing the embedding capacity. Of these three strategies, the first one adopts logical operations, the second one employs circular shifting operations, and the third one combines the operations of the first two. All of them are evaluated through comparing their prototype implementations with some existing methods in a prototypical covert communication system based on VoIP (called StegVoIP). The experimental results show that the proposed strategies can effectively enhance the embedding transparency while maintaining the maximum embedding capacity.