DST approach to enhance audio quality on lost audio packet steganography

Lost audio packet steganography (LACK) is a steganography technique established on the VoIP network. LACK provides a high-capacity covert channel over VoIP network by artificially delaying and dropping a number of packets in use to convey stegnogram. However, the increasing loss of packets will hurt the quality of the VoIP service. The quality deterioration will not only affect the legitimate VoIP service but also constrain the capacity of the covert channel. Discrete spring transform (DST) is proven to be a way to eliminate the perceptual redundancy in the multimedia signal. In this paper, the DST is applied on the LACK so that the perceptual redundancy of the voice frames is suppressed. In this way, the less redundant VoIP frames with perceptual equivalent quality can be transmitted in a channel whose capacity is squeezed by the established covert channel. As a result, the VoIP perceptual quality can be maintained with the existence of the covert channel. Meanwhile, the proposed DST-based method demonstrates the possibilities in exploiting the perceptual space of the multimedia signal. The simulation results show that the DST on LACK achieves up to 24 % more capacity over the LACK scheme.

[1]  Jessica J. Fridrich,et al.  Quantitative Structural Steganalysis of Jsteg , 2010, IEEE Transactions on Information Forensics and Security.

[2]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[3]  Wojciech Mazurczyk,et al.  Steganography of VoIP Streams , 2008, OTM Conferences.

[4]  Hamid Sharif,et al.  Real-time audio steganography attack based on automatic objective quality feedback , 2016, Secur. Commun. Networks.

[5]  Wojciech Mazurczyk,et al.  Lost audio packets steganography: the first practical evaluation , 2011, Secur. Commun. Networks.

[6]  Yun Q. Shi,et al.  Detecting Covert Channels in Computer Networks Based on Chaos Theory , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Sen Bai,et al.  Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Charles D. Creusere,et al.  Audio quality assessment using the mean structural similarity measure , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[9]  Hamid Sharif,et al.  A video steganography attack using multi-dimensional Discrete Spring Transform , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.

[10]  Hamid Sharif,et al.  A novel active warden steganographic attack for next-generation steganography , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[11]  Hamid Sharif,et al.  Frequency domain discrete spring transform: A novel frequency domain steganographic attack , 2014, 2014 9th International Symposium on Communication Systems, Networks & Digital Sign (CSNDSP).

[12]  Wojciech Mazurczyk,et al.  On steganography in lost audio packets , 2014, Secur. Commun. Networks.

[13]  Steven Gianvecchio,et al.  An Entropy-Based Approach to Detecting Covert Timing Channels , 2011, IEEE Transactions on Dependable and Secure Computing.

[14]  Wojciech Mazurczyk,et al.  LACK—a VoIP steganographic method , 2008, Telecommun. Syst..

[15]  Wojciech Mazurczyk,et al.  VoIP steganography and its Detection—A survey , 2012, ACM Comput. Surv..

[16]  Cheng-Hsing Yang,et al.  Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.

[17]  Ming Li,et al.  Extracting Spread-Spectrum Hidden Data From Digital Media , 2013, IEEE Transactions on Information Forensics and Security.

[18]  Hamid Sharif,et al.  An active audio steganography attacking method using discrete spring transform , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[19]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[20]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[21]  Xiapu Luo,et al.  Robust Network Covert Communications Based on TCP and Enumerative Combinatorics , 2012, IEEE Transactions on Dependable and Secure Computing.

[22]  Hamid Sharif,et al.  Steganography attack based on Discrete Spring Transform and image geometrization , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[23]  Hamid Sharif,et al.  An anti-steganographic approach for removing secret information in digital audio data hidden by spread spectrum methods , 2013, 2013 IEEE International Conference on Communications (ICC).

[24]  Junji Shikata,et al.  Unconditionally Secure Steganography Against Active Attacks , 2008, IEEE Transactions on Information Theory.