Skip to main content
Erschienen in: Multimedia Systems 3/2018

31.07.2017 | Regular Paper

An efficient and secure VoIP communication system with chaotic mapping and message digest

verfasst von: Yijing Jiang, Shanyu Tang

Erschienen in: Multimedia Systems | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As one of the most popular real-time services on the Internet, Voice over internet protocol (VoIP) has attracted researchers’ attention in the information security field for its characters of real-time and high flow. To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams. In the proposed algorithm, secret data were divided into blocks after being encrypted with a block cipher, and then each block of secret data was embedded into VoIP streaming packets randomly using a chaotic mapping. The symmetric key was distributed through an efficient and secure channel, and the message digest was implemented to protect the integrity of secret data. The experimental data were collected by comparing audio data between the sender and the receiver. The experimental results indicated that data embedding had little impact on the quality of speech. Besides, statistical analysis could not detect the secret data embedded in VoIP streams using the block cipher and random numbers generated from chaotic mapping. The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics and Secur. 3, 488–497 (2008)CrossRef Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics and Secur. 3, 488–497 (2008)CrossRef
2.
Zurück zum Zitat Lee, Y.K., Chen, L.H.: High capacity image steganographic model. IEEE Proc. Vis. Image Signal Process. 147(3), 288–294 (2000)CrossRef Lee, Y.K., Chen, L.H.: High capacity image steganographic model. IEEE Proc. Vis. Image Signal Process. 147(3), 288–294 (2000)CrossRef
3.
Zurück zum Zitat Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2016)CrossRef Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2016)CrossRef
4.
Zurück zum Zitat Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1, 32–44 (2003)CrossRef Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1, 32–44 (2003)CrossRef
5.
Zurück zum Zitat Al-Dmour, H., Al-Ani, A.: A steganography embedding method based on edge identification and XOR coding. Expert Syst. Appl. 46, 293–306 (2016)CrossRef Al-Dmour, H., Al-Ani, A.: A steganography embedding method based on edge identification and XOR coding. Expert Syst. Appl. 46, 293–306 (2016)CrossRef
6.
Zurück zum Zitat Darsana, R., Vijayan, A.: Audio steganography using modified LSB and PVD. Trends Netw. Commun. 197, 11–20 (2011)CrossRef Darsana, R., Vijayan, A.: Audio steganography using modified LSB and PVD. Trends Netw. Commun. 197, 11–20 (2011)CrossRef
7.
Zurück zum Zitat Cvejic, N., Seppanen, T.: Increasing the capacity of LSB-based audio steganography. In: Proc. 5th IEEE Workshop on Multimedia Signal Processing (MMSP), St Thomas, pp. 336–338 (2016) Cvejic, N., Seppanen, T.: Increasing the capacity of LSB-based audio steganography. In: Proc. 5th IEEE Workshop on Multimedia Signal Processing (MMSP), St Thomas, pp. 336–338 (2016)
8.
Zurück zum Zitat Bao, P., Ma, X.H.: MP3-resistant music steganography based on dynamic range transform. In: Proc. IEEE Int. Symp. Intelligent Signal Processing and Communication Systems (ISPACS), pp. 266–271 (2004) Bao, P., Ma, X.H.: MP3-resistant music steganography based on dynamic range transform. In: Proc. IEEE Int. Symp. Intelligent Signal Processing and Communication Systems (ISPACS), pp. 266–271 (2004)
9.
Zurück zum Zitat Cetin, O., Akar, F., Ozcerit, A.T., Cakiroglu, M., Bayilmis, C.: A blind steganography method based on histograms on video files. Imaging Sci. J. 60(2), 75–82 (2012)CrossRef Cetin, O., Akar, F., Ozcerit, A.T., Cakiroglu, M., Bayilmis, C.: A blind steganography method based on histograms on video files. Imaging Sci. J. 60(2), 75–82 (2012)CrossRef
10.
Zurück zum Zitat Aoki, N.: A packet loss concealment technique for VoIP using steganography. In: Proc. Int. Symp. Intelligent Signal Processing and Communication Systems (ISPACS), pp. 470–473 (2003) Aoki, N.: A packet loss concealment technique for VoIP using steganography. In: Proc. Int. Symp. Intelligent Signal Processing and Communication Systems (ISPACS), pp. 470–473 (2003)
11.
Zurück zum Zitat Miao, R., Huang, Y.F.: An approach of covert communication based on the adaptive steganography scheme on Voice over IP. In: Proc. IEEE Int Conf. Communications (ICC), pp. 1–5 (2011) Miao, R., Huang, Y.F.: An approach of covert communication based on the adaptive steganography scheme on Voice over IP. In: Proc. IEEE Int Conf. Communications (ICC), pp. 1–5 (2011)
12.
Zurück zum Zitat Wu, Z., Yang, W.: G.711-based adaptive speech information hiding approach. In: Proc. Int. Conf. Intelligent Computing (ICIC), pp. 1139–1144 (2006) Wu, Z., Yang, W.: G.711-based adaptive speech information hiding approach. In: Proc. Int. Conf. Intelligent Computing (ICIC), pp. 1139–1144 (2006)
13.
Zurück zum Zitat Ito, A., Suzuki, Y.: Information hiding for G.711 speech based on substitution of least significant bits and estimation of tolerable distortion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E93-A, 1279–1286 (2010)CrossRef Ito, A., Suzuki, Y.: Information hiding for G.711 speech based on substitution of least significant bits and estimation of tolerable distortion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E93-A, 1279–1286 (2010)CrossRef
14.
Zurück zum Zitat Tian, H., Zhou, K., Huang, Y., Feng, D., Liu, J.: A covert communication model based on least significant bits steganography in voice over IP. In: Young Computer Scientists (ICYCS 2008). The 9th International Conference for IEEE, pp. 647–652 (2008) Tian, H., Zhou, K., Huang, Y., Feng, D., Liu, J.: A covert communication model based on least significant bits steganography in voice over IP. In: Young Computer Scientists (ICYCS 2008). The 9th International Conference for IEEE, pp. 647–652 (2008)
15.
Zurück zum Zitat Kratzer, C., Dittmann, J., Vogel, T., Hillert, R.: Design and evaluation of steganography for Voice-over-IP. In: Proc. IEEE Int. Symp. Circuits and Systems, Kos, Greece, pp. 2337–2340 (2006) Kratzer, C., Dittmann, J., Vogel, T., Hillert, R.: Design and evaluation of steganography for Voice-over-IP. In: Proc. IEEE Int. Symp. Circuits and Systems, Kos, Greece, pp. 2337–2340 (2006)
16.
Zurück zum Zitat Xu, T., Yang, Z.: Simple and effective speech steganography in G.723.1 low-rate codes. In: Proc. Int. Conf. Wireless communications and Signal Processing (WCSP), Nanjing, China, pp. 1–4 (2009) Xu, T., Yang, Z.: Simple and effective speech steganography in G.723.1 low-rate codes. In: Proc. Int. Conf. Wireless communications and Signal Processing (WCSP), Nanjing, China, pp. 1–4 (2009)
17.
Zurück zum Zitat Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. Lect. Notes Comput. Sci. 5332, 1001–1018 (2008)CrossRef Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. Lect. Notes Comput. Sci. 5332, 1001–1018 (2008)CrossRef
18.
Zurück zum Zitat Abdullaziz, O.I., Goh, V.T., Ling, H.C., Wong, K.: AIPISteg: an active IP identification based steganographic method. J. Netw. Comput. Appl. 63, 150–158 (2016)CrossRef Abdullaziz, O.I., Goh, V.T., Ling, H.C., Wong, K.: AIPISteg: an active IP identification based steganographic method. J. Netw. Comput. Appl. 63, 150–158 (2016)CrossRef
19.
Zurück zum Zitat Mazurczyk, W.: Lost audio packets steganography: the first practical evaluation. Secur. Commun. Netw. 5(12), 1394–1403 (2012)CrossRef Mazurczyk, W.: Lost audio packets steganography: the first practical evaluation. Secur. Commun. Netw. 5(12), 1394–1403 (2012)CrossRef
20.
Zurück zum Zitat Aoki, N.: A semi-lossless steganography technique for G.711 telephony speech. In: Proc. 6th Int. Conf. Intelligent Information Hiding and Multimedia Signal (IIH-MSP), pp. 15–17 (2010) Aoki, N.: A semi-lossless steganography technique for G.711 telephony speech. In: Proc. 6th Int. Conf. Intelligent Information Hiding and Multimedia Signal (IIH-MSP), pp. 15–17 (2010)
21.
Zurück zum Zitat Zhou, K., Liu, J., Tian, H., Li, C.H.: State-based steganography in low bit rate speech. In: Proc. 20th ACM Int. Conf. Multimedia, pp. 1109–1112 (2012) Zhou, K., Liu, J., Tian, H., Li, C.H.: State-based steganography in low bit rate speech. In: Proc. 20th ACM Int. Conf. Multimedia, pp. 1109–1112 (2012)
22.
Zurück zum Zitat Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)CrossRef Huang, Y.F., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)CrossRef
23.
Zurück zum Zitat Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)CrossRef Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)CrossRef
24.
Zurück zum Zitat Tian, H., Zhou, K., Jiang, H., Liu, J., Huang, Y., Feng, D.: An M-sequence based steganography model for voice over IP. In: Communications (ICC09) IEEE International Conference on, pp. 1–5 (2009) Tian, H., Zhou, K., Jiang, H., Liu, J., Huang, Y., Feng, D.: An M-sequence based steganography model for voice over IP. In: Communications (ICC09) IEEE International Conference on, pp. 1–5 (2009)
25.
Zurück zum Zitat Tian, H., Jiang, H., Zhou, K., Feng, D.: Adaptive partial-matching steganography for voice over IP using triple M sequences. Comput. Commun. 34, 2236–2247 (2011)CrossRef Tian, H., Jiang, H., Zhou, K., Feng, D.: Adaptive partial-matching steganography for voice over IP using triple M sequences. Comput. Commun. 34, 2236–2247 (2011)CrossRef
26.
Zurück zum Zitat Chang, P.C., Yu, H.M.: Dither-like data hiding in multistage vector quantization of MELP and G.729 speech coding. In: Conference Record of the Thirty-Sixth Asilomar Conference on Signals, Systems and Computers (2), pp. 1199–1203 (2002) Chang, P.C., Yu, H.M.: Dither-like data hiding in multistage vector quantization of MELP and G.729 speech coding. In: Conference Record of the Thirty-Sixth Asilomar Conference on Signals, Systems and Computers (2), pp. 1199–1203 (2002)
27.
Zurück zum Zitat Wu, Z.J., Cao, H.J., Li, D.Z.: An approach of steganography in G.729 bitstream based on matrix coding and interleaving. Chin. J. Electron. 24(1), 157–165 (2015)CrossRef Wu, Z.J., Cao, H.J., Li, D.Z.: An approach of steganography in G.729 bitstream based on matrix coding and interleaving. Chin. J. Electron. 24(1), 157–165 (2015)CrossRef
28.
Zurück zum Zitat Rahman, A., Amritha, P.P.: Using signature for hidden communication prevention in IP telephony. In: Suresh, L.P., Dash, S.S., Panigrahi, B.K. (eds.) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Springer India, New Delhi, pp. 489–494 (2015) Rahman, A., Amritha, P.P.: Using signature for hidden communication prevention in IP telephony. In: Suresh, L.P., Dash, S.S., Panigrahi, B.K. (eds.) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Springer India, New Delhi, pp. 489–494 (2015)
29.
Zurück zum Zitat Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimedia Tools Appl. 70(3), 2139–2156 (2014)CrossRef Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimedia Tools Appl. 70(3), 2139–2156 (2014)CrossRef
30.
Zurück zum Zitat Thenmozhi, S, Chandrasekaran, M: A novel technique for image steganography using nonlinear chaotic map. In: Intelligent Systems and Control (ISCO), 2013 7th International Conference on. IEEE, pp. 307–311(2013) Thenmozhi, S, Chandrasekaran, M: A novel technique for image steganography using nonlinear chaotic map. In: Intelligent Systems and Control (ISCO), 2013 7th International Conference on. IEEE, pp. 307–311(2013)
31.
Zurück zum Zitat Anees, A., Siddiqui, A.M., Ahmed, J., Hussain, I.: A technique for digital steganography using chaotic maps. Nonlinear Dyn. 75(4), 807–816 (2014)CrossRef Anees, A., Siddiqui, A.M., Ahmed, J., Hussain, I.: A technique for digital steganography using chaotic maps. Nonlinear Dyn. 75(4), 807–816 (2014)CrossRef
32.
33.
Zurück zum Zitat Neter, J., Wasserman, W., Whitmore, G.A.: Applied Statistics, 4th edn, pp. 435–450. Simon & Schuster Inc., New York City (1993) Neter, J., Wasserman, W., Whitmore, G.A.: Applied Statistics, 4th edn, pp. 435–450. Simon & Schuster Inc., New York City (1993)
Metadaten
Titel
An efficient and secure VoIP communication system with chaotic mapping and message digest
verfasst von
Yijing Jiang
Shanyu Tang
Publikationsdatum
31.07.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Multimedia Systems / Ausgabe 3/2018
Print ISSN: 0942-4962
Elektronische ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-017-0565-6

Weitere Artikel der Ausgabe 3/2018

Multimedia Systems 3/2018 Zur Ausgabe

Neuer Inhalt