Y. Huang
Steganalysis of compressed speech to detect covert voice over Internet protocol channels
Huang, Y.; Tang, S.; Bao, C.; Yip, YJ
Authors
S. Tang
C. Bao
YJ Yip
Abstract
A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This study reveals our findings in analysing the principle of G.723.1 codec that there are ?unused' bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detection and regression analysis is suggested in this study. The proposed method can not only detect the hidden message embedded in a compressed voice over Internet protocol (VoIP) speech, but also accurately estimate the embedded message length. The method is based on the second statistics, that is, doing a second steganography (embedding information in a sampled speech at an embedding rate followed by embedding another information at a different level of data embedding) in order to estimate the hidden message length. Experimental results have proven the effectiveness of the steganalysis method for detecting the covert channel in the compressed VoIP speech.
Citation
Huang, Y., Tang, S., Bao, C., & Yip, Y. (2011). Steganalysis of compressed speech to detect covert voice over Internet protocol channels. IET Information Security, 5(1), 26-32. https://doi.org/10.1049/iet-ifs.2010.0032
Journal Article Type | Article |
---|---|
Publication Date | Apr 1, 2011 |
Deposit Date | Aug 14, 2012 |
Publicly Available Date | Apr 5, 2016 |
Journal | IET Information Security |
Print ISSN | 1751-8709 |
Publisher | Institution of Engineering and Technology (IET) |
Peer Reviewed | Peer Reviewed |
Volume | 5 |
Issue | 1 |
Pages | 26-32 |
DOI | https://doi.org/10.1049/iet-ifs.2010.0032 |
Publisher URL | http://dx.doi.org/10.1049/iet-ifs.2010.0032 |
Additional Information | Additional Information : This paper is a postprint of a paper submitted to and accepted for publication in IET Information Security and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at IET Digital Library |
Files
Accepted Version
(246 Kb)
PDF
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search