Audio steganography with AES for real-time covert Voice over Internet Protocol communications

Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Jiang, Yijing, Zhang, Liping and Zhou, Zhangbing (2014) Audio steganography with AES for real-time covert Voice over Internet Protocol communications. Science China Information Sciences, 57 (3). pp. 1-14. ISSN 1674-733X

[thumbnail of Audio steganography with AES for real-time covert Voice over Internet Protocol communications.pdf]
Preview
PDF
Audio steganography with AES for real-time covert Voice over Internet Protocol communications.pdf - Accepted Version

Download (493kB) | Preview

Abstract

As a popular real-time service on the Internet, Voice over Internet Protocol (VoIP) communication attracts more and more attention from the researchers in the information security field. In this study, we proposed a VoIP steganographic algorithm with variable embedding capacities, incorporating AES and key distribution, to realize a real-time covert VoIP communication. The covert communication system was implemented by embedding a secret message encrypted with symmetric cryptography AES-128 into audio signals encoded by PCM codec. At the beginning of each VoIP call, a symmetric session key (SK) was assigned to the receiver with a Session Initiation Protocol-based authentication method. The secret message was encrypted and then embedded into audio packets with different embedding algorithms before sending them, so as to meet the real-time requirements of VoIP communications. For each audio packet, the embedding capacity was calculated according to the specific embedding algorithm used. The encryption and embedding processes were almost synchronized. The time cost of encryption was so short that it could be ignored. As a result of AES-based steganography, observers could not detect the hidden message using simple statistical analysis. At the receiving end, the corresponding algorithm along with the SK was employed to retrieve the original secret message from the audio signals. Performance evaluation with state-of-the-art network equipment and security tests conducted using the Mann-Whitney-Wilcoxon method indicated that the proposed steganographic algorithm is secure, effective, and robust.

Item Type: Article
Identifier: 10.1007/s11432-014-5063-2
Additional Information: © Science China Press and Springer-Verlag Berlin Heidelberg 2014. The final publication is available at Springer via https://doi.org/10.1007/s11432-014-5063-2
Keywords: oIP, steganography, AES, covert communication, Mann-Whitney-Wilcoxon
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 26 Sep 2017 10:25
Last Modified: 06 Feb 2024 15:54
URI: https://repository.uwl.ac.uk/id/eprint/3931

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu