Frame-bitrate-change based steganography for voice-over-IP

Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP (VoIP). However, direct modification on frames is often independent of the inherent speech features, which may lead to great degradation of speech quality. A novel frame-bitrate-change based steganography is proposed in this work, which discovers a novel covert channel for VoIP and introduces less distortion. This method exploits the feature of multi-rate speech codecs that the practical bitrate of speech frame is identified only by speech decoder at receiving end. Based on this characteristic, two steganography strategies called bitrate downgrading (BD) and bitrate switching (BS) are provided. The first strategy substitutes high bit-rate speech frames with lower ones to embed secret message, which introduces very low distortion in practice, and much less than other bits-modification based methods with the same embedding capacity. The second one encodes secret message bits into different types of speech frames, which is an alternative choice for supplement. The two strategies are implemented and tested on our covert communication system StegVoIP. The experiment results show that our proposed method is effective and fulfills the real-time requirement of VoIP communication.

[1]  Jin Liu,et al.  Efficient Least-significant-bits Steganography for VoIP , 2012 .

[2]  Xian-Sheng Hua,et al.  Proceedings of the 29th ACM International Conference on Multimedia , 1998, MM 2012.

[3]  Hong Jiang,et al.  Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography , 2012, Comput. J..

[4]  Yong-feng Huang,et al.  Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis , 2012, Journal of Zhejiang University SCIENCE C.

[5]  Hui Tian,et al.  A VoIP-based Covert Communication Scheme Using Compounded Pseudorandom Sequence , 2012 .

[6]  Wojciech Mazurczyk,et al.  Using transcoding for hidden communication in IP telephony , 2011, Multimedia Tools and Applications.

[7]  Henning Schulzrinne,et al.  RTP Profile for Audio and Video Conferences with Minimal Control , 2003, RFC.

[8]  Yongfeng Huang,et al.  Steganalysis of compressed speech to detect covert voice over Internet protocol channels , 2011, IET Inf. Secur..

[9]  Huang,et al.  A Novel Covert Timing Channel Based on RTP/RTCP ∗ , 2012 .

[10]  Sebastian Zander,et al.  Covert channels and countermeasures in computer network protocols [Reprinted from IEEE Communications Surveys and Tutorials] , 2007, IEEE Communications Magazine.

[11]  Ke Zhou,et al.  Dynamic matrix encoding strategy for voice-over-IP steganography , 2010 .

[12]  Yongfeng Huang,et al.  Pulse position checking-based steganalysis of G.723.1 compressed speech in VoIP , 2011, Int. J. Multim. Intell. Secur..

[13]  Zhejiang da xue Journal of Zhejiang University. B Science. , 2004 .

[14]  Yongfeng Huang,et al.  Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.

[15]  Huang Yong-feng,et al.  Modeling and optimizing of the information hiding communication system over streaming media , 2008 .

[16]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[17]  Angelos D. Keromytis,et al.  Voice-over-IP Security: Research and Practice , 2010, IEEE Security & Privacy.

[18]  Jin Liu,et al.  State-based steganography in low bit rate speech , 2012, ACM Multimedia.

[19]  Quincy Wu,et al.  Information Hiding in Real-Time VoIP Streams , 2007, ISM 2007.