Skip to main content
Top

2015 | OriginalPaper | Chapter

Using Signature for Hidden Communication Prevention in IP Telephony

Authors : Ajvad Rahman, P. P. Amritha

Published in: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper prevents the steganographic method for IP telephony called transcoding steganography (TranSteg). Typically, in TranSteg, it is the overt data that is to compress to make space for steganogram. TranSteg finds appropriate codec that will result in the voice quality similar to the original. In signature-based system, the signature of the voice payload is appended to the packet to provide integrity. The signature of the data becomes invalid when there is some change in voice data. This method detects the hidden communication between a VoIP call. The signature-based scheme concept is described in this paper.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference W. Mazurczyk, P. Szaga, K. Szczypiorski, Using transcoding for hidden communication in IP telephony. Multimedia Tools Appl. 1–27 (2011) W. Mazurczyk, P. Szaga, K. Szczypiorski, Using transcoding for hidden communication in IP telephony. Multimedia Tools Appl. 1–27 (2011)
2.
go back to reference A. Naofumi, VoIP packet loss concealment based on two-side pitch waveform replication technique using steganography, in 2004 IEEE Region 10 Conference TENCON 2004, vol. 100 (2004) A. Naofumi, VoIP packet loss concealment based on two-side pitch waveform replication technique using steganography, in 2004 IEEE Region 10 Conference TENCON 2004, vol. 100 (2004)
3.
go back to reference K. Ahsan, D. Kundur, Practical data hiding in TCP/IP, in Proceedings of Workshop on Multimedia Security at ACM Multimedia 2002 (2002) K. Ahsan, D. Kundur, Practical data hiding in TCP/IP, in Proceedings of Workshop on Multimedia Security at ACM Multimedia 2002 (2002)
4.
go back to reference J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, vol 5681 (2005), pp. 607–618 J. Dittmann, D. Hesse, R. Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set, in Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VII, vol 5681 (2005), pp. 607–618
5.
go back to reference C. Krätzer, J. Dittmann, T. Vogel, R. Hillert, Design and evaluation of steganography for voice-over-IP, in Proceedings of IEEE International Symposium on Circuits and Systems, (ISCAS) (2006) C. Krätzer, J. Dittmann, T. Vogel, R. Hillert, Design and evaluation of steganography for voice-over-IP, in Proceedings of IEEE International Symposium on Circuits and Systems, (ISCAS) (2006)
6.
go back to reference C. Wang, W. Wu, Information hiding in real-time VoIP streams, in Ninth IEEE International Symposium on Multimedia (ISM 2007) (2007) pp. 255–262 C. Wang, W. Wu, Information hiding in real-time VoIP streams, in Ninth IEEE International Symposium on Multimedia (ISM 2007) (2007) pp. 255–262
7.
go back to reference T. Takahashi, W. Lee, An assessment of VoIP covert channel threats, in Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (2007) T. Takahashi, W. Lee, An assessment of VoIP covert channel threats, in Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (2007)
8.
go back to reference N. Aoki, A technique of lossless steganography for G.711 telephony speech, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008) (2008) pp. 608–611 N. Aoki, A technique of lossless steganography for G.711 telephony speech, in International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008) (2008) pp. 608–611
9.
go back to reference K.W. Mazurczy, Z. Kotulski, New security and control protocol for VoIP based on steganography and digital watermarking, in Proceedings of 5th International Conference on Computer Science—Research and Applications (IBIZA 2006) (2006) K.W. Mazurczy, Z. Kotulski, New security and control protocol for VoIP based on steganography and digital watermarking, in Proceedings of 5th International Conference on Computer ScienceResearch and Applications (IBIZA 2006) (2006)
10.
go back to reference K. Mazurczy, S. Szczypiorski, Steganography of VoIP streams, in Proceedings of on the Move Federated Conferences and Workshops. The 3rd International Symposium on Information Security (IS’08) (2008), pp. 1001–1018 K. Mazurczy, S. Szczypiorski, Steganography of VoIP streams, in Proceedings of on the Move Federated Conferences and Workshops. The 3rd International Symposium on Information Security (IS’08) (2008), pp. 1001–1018
11.
go back to reference L.Y. Bai, Y. Huang, G. Hou, B. Xiao, Covert channels based on jitter field of the RTCP header, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008) L.Y. Bai, Y. Huang, G. Hou, B. Xiao, Covert channels based on jitter field of the RTCP header, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2008)
12.
go back to reference A. Plies, M. Massoth, R. Marx, Approach to identity card-based voice-over-IP authentication. 2010 Second International Conferences on Advances in Multimedia (MMEDIA). IEEE (2010) A. Plies, M. Massoth, R. Marx, Approach to identity card-based voice-over-IP authentication. 2010 Second International Conferences on Advances in Multimedia (MMEDIA). IEEE (2010)
Metadata
Title
Using Signature for Hidden Communication Prevention in IP Telephony
Authors
Ajvad Rahman
P. P. Amritha
Copyright Year
2015
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2135-7_52

Premium Partner