Steganalysis of compressed speech to detect covert Voice over Internet Protocol channels

Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Bao, Chunlan and Yip, Yau Jim (2011) Steganalysis of compressed speech to detect covert Voice over Internet Protocol channels. IET Information Security, 5 (1). pp. 26-32. ISSN 1751-8709

[thumbnail of Steganalysis of compressed speech to detect covert Voice over Internet Protocol channels.pdf]
Preview
PDF
Steganalysis of compressed speech to detect covert Voice over Internet Protocol channels.pdf - Accepted Version

Download (192kB) | Preview

Abstract

A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This study reveals our findings in analysing the principle of G.723.1 codec that there are `unused` bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detection and regression analysis is suggested in this study. The proposed method can not only detect the hidden message embedded in a compressed voice over Internet protocol (VoIP) speech, but also accurately estimate the embedded message length. The method is based on the second statistics, that is, doing a second steganography (embedding information in a sampled speech at an embedding rate followed by embedding another information at a different level of data embedding) in order to estimate the hidden message length. Experimental results have proven the effectiveness of the steganalysis method for detecting the covert channel in the compressed VoIP speech.

Item Type: Article
Identifier: 10.1049/iet-ifs.2010.0032
Additional Information: © 2011 Institution of Engineering and Technology. This paper is a postprint of a paper submitted to and accepted for publication in IET Information Security and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at IET Digital Library.
Keywords: Second steganography, Steganalysis, VoIP, Compressed speech
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 27 Sep 2017 23:21
Last Modified: 06 Feb 2024 15:54
URI: https://repository.uwl.ac.uk/id/eprint/3959

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu