Steganography and steganalysis in voice over IP: A review
Z Wu, J Guo, C Zhang, C Li - Sensors, 2021 - mdpi.com
The rapid advance and popularization of VoIP (Voice over IP) has also brought security
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …
High capacity speech steganography for the G723. 1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding
H Kheddar, D Megías - Applied Intelligence, 2022 - Springer
In this paper, a novel steganographic method for Voice over IP applications—called
Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …
Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …
Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams
This paper considers a new task of detecting heterogeneous parallel steganography (HPS)
on streaming media. This task is to detect the existence of the confidential messages hidden …
on streaming media. This task is to detect the existence of the confidential messages hidden …
AMR steganalysis based on second-order difference of pitch delay
This paper presents a novel steganalysis scheme for the detection of adaptive multi-rate
(AMR) audio steganography. AMR audio codec is used widely in mobile communication and …
(AMR) audio steganography. AMR audio codec is used widely in mobile communication and …
VoIP network covert channels to enhance privacy and information sharing
J Saenger, W Mazurczyk, J Keller… - Future Generation …, 2020 - Elsevier
Abstract Information hiding is increasingly used to implement covert channels, to exfiltrate
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …
Towards deriving insights into data hiding methods using pattern-based approach
In network information hiding, hiding patterns are used to describe hiding methods and their
taxonomy. In this paper, we analyze the current state of hiding patterns and we further …
taxonomy. In this paper, we analyze the current state of hiding patterns and we further …
Covert communication over VoIP streaming media with dynamic key distribution and authentication
J Peng, S Tang - IEEE Transactions on Industrial Electronics, 2020 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial
applications. VoIP streams can be used as innocuous cover objects to hide the secret data …
applications. VoIP streams can be used as innocuous cover objects to hide the secret data …
Hierarchical representation network for steganalysis of qim steganography in low-bit-rate speech signals
With the volume of Voice over IP (VoIP) traffic rising shapely, more and more VoIP-based
steganography methods have emerged in recent years, which poses a great threat to the …
steganography methods have emerged in recent years, which poses a great threat to the …
Pitch and fourier magnitude based steganography for hiding 2.4 kbps melp bitstream
In this study, the authors present a new steganographic technique called random least
significant bits of pitch and Fourier magnitude steganography (RLPFS). It is based on hiding …
significant bits of pitch and Fourier magnitude steganography (RLPFS). It is based on hiding …
Exploiting IP telephony with silence suppression for hidden data transfers
S Schmidt, W Mazurczyk, R Kulesza, J Keller… - Computers & …, 2018 - Elsevier
Abstract Information hiding is increasingly used by malware for creating covert channels to
exfiltrate data, orchestrate attacks, as well as to download additional code for extending its …
exfiltrate data, orchestrate attacks, as well as to download additional code for extending its …