Peng, Jinghui, Jiang, Yijing, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Meziane, Farid (2019) Security of streaming media communications with logistic map and self-adaptive detection-based steganography. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971
Preview |
PDF
Tang_etal_IEEE_TDSC_2019_Security_of_streaming_media_communications_with_logistic_map_and_self-adaptive_detection-based_steganography.pdf - Accepted Version Download (7MB) | Preview |
Abstract
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet. In this study an Active Voice Period Detection algorithm is devised for PCM codec to detect whether a VoIP packet carries active or inactive voice data, and the data embedding location in a VoIP stream is chosen randomly according to random sequences generated from a logistic chaotic map. The initial parameters of the chaotic map and the selection of where to embed the message are negotiated between the communicating parties. Steganography experiments on active and inactive voice periods were carried out using a VoIP communications system. Performance evaluation and security analysis indicates that the proposed VoIP steganographic scheme can withstand statistical detection, and achieve secure real-time covert communications with high speech quality and negligible signal distortion.
Item Type: | Article |
---|---|
Identifier: | 10.1109/tdsc.2019.2946138 |
Additional Information: | © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This work was supported in part by the National Natural Science Foundation of China under Grant 61272469. Prof. S. Tang is the corresponding author. |
Keywords: | security, VoIP, streaming communications, steganography |
Subjects: | Computing > Information security > Cyber security Computing > Information security |
Depositing User: | Shanyu Tang |
Date Deposited: | 01 Nov 2019 09:26 |
Last Modified: | 04 Nov 2024 11:51 |
URI: | https://repository.uwl.ac.uk/id/eprint/6496 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |