Advertisement

A Reliable Covert Communication Scheme Based on VoIP Steganography

  • Harrison Neal
  • Hala ElAaragEmail author
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8948)

Abstract

Steganography is the science of hiding information in such a way that an adversary wouldn’t know it existed. A significant amount of research has been done in this field for non-real time mediums. Research on real time mediums, for example Voice over Internet Protocol (VoIP), isn’t as mature. In this paper, we propose an algorithm that enables data hiding in G.711, the most commonly used voice codec for VoIP devices, while gracefully handling packet loss. This would allow two telephone users to covertly transfer multiple pieces of arbitrary information between their respective systems in a reliable manner. We use important performance metrics to evaluate our algorithm, namely, throughput, noise-to-signal ratio and the Perceptual Evaluation of Speech Quality algorithm. We demonstrate that our algorithm performs well compared to other algorithms proposed in the literature in real world environments, where packet loss is inevitable, by maintaining high throughput and good speech quality.

Keywords

VoIP G.711 Steganography Covert communication 

References

  1. 1.
    Artz, D.: Digital steganography: hiding data within data. IEEE Internet Comput. 5, 75–80 (2001)CrossRefGoogle Scholar
  2. 2.
    Murdoch, S.J., Lewis, S.: Embedding covert channels into TCP/IP. In: Barni, M., Herrera-Joancomarti, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 247–261. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Tian, H., et al.: An adaptive steganography scheme for voice over IP. Huazhong University of Science & Technology, University of Nebraska, Tsinghua University (2009) doi: 10.1109/ISCAS.2009.5118414
  4. 4.
    Yongfeng, H., Bo, X., Honghua, X.: Implementation of covert communication based on steganography. Department of Electronic Engineering, Tsinghua University, Beijing (2008). doi: 10.1109/IIH-MSP.2008.174
  5. 5.
    Karapantazis, S., Pavlidou, F.-N.: VoIP: a comprehensive survey on a promising technology. Thessaloniki (2009). doi: 10.1016/j.comnet.2009.03.010
  6. 6.
    International Telecommunication Union: Packet-based multimedia communications (Recommendation ITU-T H.323) (2009)Google Scholar
  7. 7.
    International Telecommunication Union: Pulse Code Modulation (PCM) of Voice Frequencies (ITU-T Recommendation G.711) (1993)Google Scholar
  8. 8.
    Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. University of Toronto, Toronto (2002). 1-58113-000-0/00/0000Google Scholar
  9. 9.
    Mazurczyk, W., Lubacz, J.: LACK - a VoIP steganographic method. Institute of Telecommunications, Warsaw University, Warsaw (2009). doi: 10.1007/s11235-009-9245-y
  10. 10.
    Mazurczyk, W.: Lost audio packets steganography: the first practical evaluation. Warsaw University of Technology, Institute of Telecommunications, Warsaw, arXiv:1107.4076v1 (2011)Google Scholar
  11. 11.
    Hamdaqa, M., Tahvildari, L.: ReLACK: a reliable VoIP steganography approach. In: IEEE Fifth International Conference on Secure Software Integration and Reliability Improvement, Jeju Island, pp. 189–197 (2011)Google Scholar
  12. 12.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)CrossRefzbMATHMathSciNetGoogle Scholar
  13. 13.
    Miao, R., Huang, Y.: An approach of covert communication based on the adaptive steganography scheme on voice over IP. Department of Electronic Engineering, Tsinghua University, Beijing (2011). ISBN: 978-1-61284-231-8Google Scholar
  14. 14.
    Ito, A., Abe, S., Suzuki, Y.: Information hiding for G.711 speech based on substitution of least significant bits and estimation of tolerable distortion. Tohoku University, Sendai (2009). ISBN: 978-1-4244-2354-5Google Scholar
  15. 15.
    International Telecommunication Union: Perceptual evaluation of speech quality (Recommendation ITU-T P.862) (2001)Google Scholar
  16. 16.
    Aoki, N.: A band extension technique for G.711 speech using steganography. IEICE Trans. Commun. E89-B(6), 1896–1898 (2006)CrossRefGoogle Scholar
  17. 17.
    International Telecommunication Union: Perceptual objective listening quality assessment (ITU-T Recommendation P.863) (2011)Google Scholar
  18. 18.
    CenturyLink: CenturyLink IP Network Statistics, December 2011. https://kai02.centurylink.com/PtapRpts/Public/BackboneReport.aspx
  19. 19.
    Neal, H., ElAarag, H.: A packet loss tolerant algorithm for information hiding in voice over IP. In: Proceedings of IEEE Southeast Conference, Orlando, FL, 15–18 March 2012Google Scholar
  20. 20.
    ElAarag, H., Neal, H.: Performance analysis of current data hiding algorithms for VoIP. In: Proceedings of the Communication and Networking Simulation Symposium, Spring Simulation Multiconference, San Diego, CA, 7–10 April 2013Google Scholar
  21. 21.
    Latzenbeisser, S.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, New York (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.Department of Mathematics and Computer ScienceStetson UniversityDeLandUSA

Personalised recommendations