Abstract
So far the steganography based on streaming media is widely studied,but rarely of it is based on instant communication tools. This paper improved the previous steganography which was implemented by HOOK based on instant communication tool. The improved methods contain adaptive sockets functions hooking(ASFH) and speech recognition based on socket functions,which can be generally applied in the instant communication tools,at last we implemented these methods in the covert channels of Bol SipPhone and Gtalk. Experimental results presents that the methods are actually feasible in the communication process. Which broaden the scope of steganography based on the streaming media and have a good realistic significance.
This work is supported by National Natural Science Foundation of China (60970148, 60773140) and Natural Science Foundation of Chongqing (2008BB2296, 2008BA0018).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mazurczyk, W., Smolarczyk, M., Szczypiororski, K.: Retransmission Steganography Applied. Cryptography and Security, July 5 (2010)
Nafeesa Begum, J., Kumar, K., Sumathy, V.: Design and Implementation of Multilevel Access Control in Medical Image Transmission Using Symmetric Polynomial Based Audio Steganography. International Journal of Computer Science and Information Security 7(3), 139–146 (2010)
Moskowitz, S.A., et al.: Steganographic method and device. United States Patent. Patent number:7767712 Issue date: July 20 (2010)
Yuan, J., Zhou, X., Huang, Y.: Application of HOOK technology in network covert communication. In: CIHW 2010, Cheng du, China pp.489–496 (2010)
Hart, J.M.: Windows System Programming, 3rd edn. Addison Wesley Professional (October 26, 2004)
Jeffrey, R., Christophe, N.: Windows via C/C++, 5th edn. Microsoft Press (2008)
Schulzrinne, H., Stephen, L., Casner, F.R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications. IETF, RFC3550 (July 2003)
ITU-T Recommendation G.723.1.Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s (2006)
Mazurczyk, W., Szczypiorski, K.: Steganography of voIP streams. In: Meersman, R., Tari, Z. (eds.) OTM 2008. LNCS, vol. 5332, pp. 1001–1018. Springer, Heidelberg (2008)
Antony, W., John, G., Michael, P., et al.: Perceptual Evaluation of Speech Quality(PESQ)-A new method for speech quality assessment of telephone networks and codecs. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, Proceedings, ICASSP 2001 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jun, Y., Sen, B., Yongfeng, H., Jian, Y. (2011). Implementation of Steganography Based on HOOK. In: Jiang, L. (eds) Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19–20, 2011, Melbourne, Australia. Advances in Intelligent and Soft Computing, vol 112. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25194-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-25194-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25193-1
Online ISBN: 978-3-642-25194-8
eBook Packages: EngineeringEngineering (R0)