Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
ACM Transactions on Modeling and Computer Simulation (TOMACS) - Special issue on uniform random number generation
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
An evaluation of image based steganography methods
Multimedia Tools and Applications
Information Hiding in Real-Time VoIP Streams
ISM '07 Proceedings of the Ninth IEEE International Symposium on Multimedia
Implementation of Covert Communication Based on Steganography
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
A Technique of Lossless Steganography for G.711 Telephony Speech
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
An M-sequence based steganography model for voice over IP
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
IEEE Spectrum
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
A Survey of Covert Channels and Countermeasures in Computer Network Protocols
IEEE Communications Surveys & Tutorials
VoIP steganography and its Detection—A survey
ACM Computing Surveys (CSUR)
Hi-index | 0.24 |
Although steganographic transparency and steganographic bandwidth are believed to be two conflicting objectives in the design of steganographic systems, it is possible and necessary to strike an optimal balance between them. This paper presents an adaptive partial-matching steganography for voice over IP (VoIP). We introduce the notion of partial similarity value (PSV) to evaluate the partial matching between covers and secret messages. By properly setting a low threshold of PSV and a high threshold of PSV, we can adaptively balance steganographic transparency and bandwidth. Moreover, we employ triple m sequences to eliminate the correlation among secret messages, guide the adaptive embedding process, and encrypt synchronization signaling patterns. In addition, we introduce an improved strategy that takes into account the similarity between not only covers and encrypted messages but also covers and original messages. We evaluate the proposed approach and its improved strategy with ITU-T G.729a as the codec of the cover speech in StegVoIP that is a prototypical covert communication system based on VoIP and compare them with some existing approaches. The experimental results demonstrate that the proposed approaches can provide a better balance between steganographic transparency and bandwidth. Furthermore, the results of delay tests show that they adequately meet the real-time requirement of VoIP.