Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis

Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhang, Yuan (2011) Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis. IET Communications, 5 (7). pp. 929-936. ISSN 1751-8628

[thumbnail of Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis.pdf]
Preview
PDF
Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis.pdf - Accepted Version

Download (290kB) | Preview

Abstract

The authors describe a reliable and accurate steganalysis method for detecting covert voice-over Internet protocol (VoIP) communication channels. The proposed method utilises a unique sliding window mechanism and an improved regular singular (RS) algorithm for VoIP steganalysis, which detects the presence of least significant bit embedded VoIP streams. With this mechanism, the detection window moves forward one packet or several packets each time to screen VoIP streams. The optimum detection threshold for the proposed detection metric is computed by modelling the distributions of the new metric for stego and cover VoIP streams. Experimental analysis reveals that the proposed method improves the detection time significantly, utilising less memory resources for VoIP steganalysis, thereby enabling real-time detection of stego VoIP streams. The proposed method also provides a significant improvement on precision in detecting multiple covert VoIP channels when compared to the conventional RS method.

Item Type: Article
Identifier: 10.1049/iet-com.2010.0348
Additional Information: © 2011 Institution of Engineering and Technology. This paper is a postprint of a paper submitted to and accepted for publication in IET Communications and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at IET Digital Library.
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 27 Sep 2017 23:07
Last Modified: 06 Feb 2024 15:54
URI: https://repository.uwl.ac.uk/id/eprint/3958

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu