Secure covert communications over streaming media using dynamic steganography

Peng, Jinghui (2020) Secure covert communications over streaming media using dynamic steganography. Doctoral thesis, University of West London.

[thumbnail of Peng_UWL_Thesis_May_2020_Secure_covert_communications_over_streaming_media_using_dynamic_steganography.pdf]
Preview
PDF
Peng_UWL_Thesis_May_2020_Secure_covert_communications_over_streaming_media_using_dynamic_steganography.pdf - Accepted Version

Download (3MB) | Preview

Abstract

Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out.
A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance.
The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process.
A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel.
The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms.

Item Type: Thesis (Doctoral)
Keywords: Covert communications, hardware random key, key distribution, steganography, VoIP
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Users 4141 not found.
Date Deposited: 14 May 2020 00:00
Last Modified: 04 Nov 2024 12:48
URI: https://repository.uwl.ac.uk/id/eprint/6943

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu