Security of streaming media communications with logistic map and self-adaptive detection-based steganography

Peng, Jinghui, Jiang, Yijing, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Meziane, Farid (2019) Security of streaming media communications with logistic map and self-adaptive detection-based steganography. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971

[img]
Preview
PDF
Tang_etal_IEEE_TDSC_2019_Security_of_streaming_media_communications_with_logistic_map_and_self-adaptive_detection-based_steganography.pdf - Accepted Version

Download (7MB) | Preview

Abstract

Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet. In this study an Active Voice Period Detection algorithm is devised for PCM codec to detect whether a VoIP packet carries active or inactive voice data, and the data embedding location in a VoIP stream is chosen randomly according to random sequences generated from a logistic chaotic map. The initial parameters of the chaotic map and the selection of where to embed the message are negotiated between the communicating parties. Steganography experiments on active and inactive voice periods were carried out using a VoIP communications system. Performance evaluation and security analysis indicates that the proposed VoIP steganographic scheme can withstand statistical detection, and achieve secure real-time covert communications with high speech quality and negligible signal distortion.

Item Type: Article
Additional Information: © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This work was supported in part by the National Natural Science Foundation of China under Grant 61272469. Prof. S. Tang is the corresponding author.
Uncontrolled Keywords: security, VoIP, streaming communications, steganography
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 01 Nov 2019 09:26
Last Modified: 16 Dec 2019 10:45
URI: http://repository.uwl.ac.uk/id/eprint/6496

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu