Communications of the ACM
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Digital Steganography: Hiding Data within Data
IEEE Internet Computing
VoIP: A comprehensive survey on a promising technology
Computer Networks: The International Journal of Computer and Telecommunications Networking
ReLACK: A Reliable VoIP Steganography Approach
SSIRI '11 Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
Hi-index | 0.00 |
Steganography techniques attempt to hide pertinent information inside of other harmless information, so as to avoid detection by an adversary. A good amount of research has been done thus far on mediums that aren't processed in real-time. User-friendly products using these techniques can easily be purchased by average consumers. Real-time mediums have recently received attention as VoIP and other real-time media has entered the mainstream. Several approaches for hiding information within VoIP streams in real-time have been proposed, but little has been done to compare the performance of the algorithms proposed in the literature. In this paper, we test several current data hiding techniques on a variety of G.711 audio recordings, with the intent of giving readers a clearer understanding of which of the algorithms would best suit their purposes. We use important performance metrics to evaluate the algorithms, namely, throughput, noise-to-signal ratio and the Perceptual Evaluation of Speech Quality algorithm. Our results show that the method by Aoki allows for best throughput during silence and low volume conditions, and both methods by Ito et al, and Miao and Huang offer good throughput in noisy environments. Vulnerability to steganalysis is also considered. We devise a technique that illustrates that the algorithm by Miao and Huang is detectable as well as other LSB-based algorithms which have already been shown to be detectable by other means.