Steganography and steganalysis in voice over IP: A review

Z Wu, J Guo, C Zhang, C Li - Sensors, 2021 - mdpi.com
The rapid advance and popularization of VoIP (Voice over IP) has also brought security
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …

High capacity speech steganography for the G723. 1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding

H Kheddar, D Megías - Applied Intelligence, 2022 - Springer
In this paper, a novel steganographic method for Voice over IP applications—called
Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …

Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams

Y Hu, Y Huang, Z Yang, Y Huang - Neurocomputing, 2021 - Elsevier
This paper considers a new task of detecting heterogeneous parallel steganography (HPS)
on streaming media. This task is to detect the existence of the confidential messages hidden …

AMR steganalysis based on second-order difference of pitch delay

Y Ren, J Yang, J Wang, L Wang - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
This paper presents a novel steganalysis scheme for the detection of adaptive multi-rate
(AMR) audio steganography. AMR audio codec is used widely in mobile communication and …

VoIP network covert channels to enhance privacy and information sharing

J Saenger, W Mazurczyk, J Keller… - Future Generation …, 2020 - Elsevier
Abstract Information hiding is increasingly used to implement covert channels, to exfiltrate
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …

Towards deriving insights into data hiding methods using pattern-based approach

W Mazurczyk, S Wendzel, K Cabaj - Proceedings of the 13th …, 2018 - dl.acm.org
In network information hiding, hiding patterns are used to describe hiding methods and their
taxonomy. In this paper, we analyze the current state of hiding patterns and we further …

Covert communication over VoIP streaming media with dynamic key distribution and authentication

J Peng, S Tang - IEEE Transactions on Industrial Electronics, 2020 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial
applications. VoIP streams can be used as innocuous cover objects to hide the secret data …

Hierarchical representation network for steganalysis of qim steganography in low-bit-rate speech signals

H Yang, Z Yang, YJ Bao, Y Huang - International Conference on …, 2019 - Springer
With the volume of Voice over IP (VoIP) traffic rising shapely, more and more VoIP-based
steganography methods have emerged in recent years, which poses a great threat to the …

Pitch and fourier magnitude based steganography for hiding 2.4 kbps melp bitstream

H Kheddar, M Bouzid, D Megías - IET Signal Processing, 2019 - Wiley Online Library
In this study, the authors present a new steganographic technique called random least
significant bits of pitch and Fourier magnitude steganography (RLPFS). It is based on hiding …

Exploiting IP telephony with silence suppression for hidden data transfers

S Schmidt, W Mazurczyk, R Kulesza, J Keller… - Computers & …, 2018 - Elsevier
Abstract Information hiding is increasingly used by malware for creating covert channels to
exfiltrate data, orchestrate attacks, as well as to download additional code for extending its …