Covert communication over VoIP streaming media with dynamic key distribution and authentication

Peng, Jinghui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2021) Covert communication over VoIP streaming media with dynamic key distribution and authentication. IEEE Transactions on Industrial Electronics, 68 (4). pp. 3619-3628. ISSN 0278-0046

[img]
Preview
PDF
Covert Communication over VoIP Streaming Media with Dynamic Key Distribution and Authentication.pdf - Accepted Version

Download (1MB) | Preview

Abstract

Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. VoIP streams can be used as innocuous cover objects to hide the secret data in steganographic systems. The security offered by VoIP signaling protocols is likely to be compromised due to a sharp increase in computing power. This article describes a theoretical and experimental investigation of covert steganographic communications over VoIP streaming media. A new information-theoretical model of secure covert VoIP communications was constructed to depict the security scenarios in steganographic systems against the passive attacks. A one-way accumulation-based steganographic algorithm was devised to integrate dynamic key updating and exchange with data embedding and extraction, so as to protect steganographic systems from adversary attacks. The theoretical analysis of steganographic security using information theory proves that the proposed model for covert VoIP communications is secure against a passive adversary. The effectiveness of the steganographic algorithm for covert VoIP communications was examined by means of performance and robustness measurements. The results reveal that the algorithm has no or little impact on real-time VoIP communications in terms of imperceptibility, speech quality, and signal distortion, and is more secure and effective at improving the security of covert VoIP communications than the other related algorithms with the comparable data embedding rates.

Item Type: Article
Additional Information: © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Uncontrolled Keywords: Authentication, covert communication, key distribution, steganography, Voice over Internet Protocol (VoIP)
Subjects: Computing > Information security
Statistics
Related URLs:
Depositing User: Shanyu Tang
Date Deposited: 29 Apr 2021 15:43
Last Modified: 28 Aug 2021 07:15
URI: http://repository.uwl.ac.uk/id/eprint/7823

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu