Peng, Jinghui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2021) Covert communication over VoIP streaming media with dynamic key distribution and authentication. IEEE Transactions on Industrial Electronics, 68 (4). pp. 3619-3628. ISSN 0278-0046
Preview |
PDF
Covert Communication over VoIP Streaming Media with Dynamic Key Distribution and Authentication.pdf - Accepted Version Download (1MB) | Preview |
Abstract
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. VoIP streams can be used as innocuous cover objects to hide the secret data in steganographic systems. The security offered by VoIP signaling protocols is likely to be compromised due to a sharp increase in computing power. This article describes a theoretical and experimental investigation of covert steganographic communications over VoIP streaming media. A new information-theoretical model of secure covert VoIP communications was constructed to depict the security scenarios in steganographic systems against the passive attacks. A one-way accumulation-based steganographic algorithm was devised to integrate dynamic key updating and exchange with data embedding and extraction, so as to protect steganographic systems from adversary attacks. The theoretical analysis of steganographic security using information theory proves that the proposed model for covert VoIP communications is secure against a passive adversary. The effectiveness of the steganographic algorithm for covert VoIP communications was examined by means of performance and robustness measurements. The results reveal that the algorithm has no or little impact on real-time VoIP communications in terms of imperceptibility, speech quality, and signal distortion, and is more secure and effective at improving the security of covert VoIP communications than the other related algorithms with the comparable data embedding rates.
Item Type: | Article |
---|---|
Identifier: | 10.1109/TIE.2020.2979567 |
Additional Information: | © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Keywords: | Authentication, covert communication, key distribution, steganography, Voice over Internet Protocol (VoIP) |
Subjects: | Computing > Information security Statistics |
Related URLs: | |
Depositing User: | Shanyu Tang |
Date Deposited: | 29 Apr 2021 15:43 |
Last Modified: | 04 Nov 2024 11:31 |
URI: | https://repository.uwl.ac.uk/id/eprint/7823 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |