Skip to main content

Research Repository

Advanced Search

Steganalysis of compressed speech to detect covert voice over Internet protocol channels

Huang, Y.; Tang, S.; Bao, C.; Yip, YJ

Steganalysis of compressed speech to detect covert voice over Internet protocol channels Thumbnail


Authors

Y. Huang

S. Tang

C. Bao

YJ Yip



Abstract

A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This study reveals our findings in analysing the principle of G.723.1 codec that there are ?unused' bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detection and regression analysis is suggested in this study. The proposed method can not only detect the hidden message embedded in a compressed voice over Internet protocol (VoIP) speech, but also accurately estimate the embedded message length. The method is based on the second statistics, that is, doing a second steganography (embedding information in a sampled speech at an embedding rate followed by embedding another information at a different level of data embedding) in order to estimate the hidden message length. Experimental results have proven the effectiveness of the steganalysis method for detecting the covert channel in the compressed VoIP speech.

Citation

Huang, Y., Tang, S., Bao, C., & Yip, Y. (2011). Steganalysis of compressed speech to detect covert voice over Internet protocol channels. IET Information Security, 5(1), 26-32. https://doi.org/10.1049/iet-ifs.2010.0032

Journal Article Type Article
Publication Date Apr 1, 2011
Deposit Date Aug 14, 2012
Publicly Available Date Apr 5, 2016
Journal IET Information Security
Print ISSN 1751-8709
Publisher Institution of Engineering and Technology (IET)
Peer Reviewed Peer Reviewed
Volume 5
Issue 1
Pages 26-32
DOI https://doi.org/10.1049/iet-ifs.2010.0032
Publisher URL http://dx.doi.org/10.1049/iet-ifs.2010.0032
Additional Information Additional Information : This paper is a postprint of a paper submitted to and accepted for publication in IET Information Security and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at IET Digital Library

Files





Downloadable Citations