Covert communications through mobile voice channels

The rapid development and growth of cellular mobile networks in recent years has made voice channels widely available almost everywhere. On the other hand, voice dedicated channels possess properties that make them ideal options for high priority real-time secure communications. Beside these realities, information embedding has gained remarkable attention in recent years due to its potential application in multimedia security. In this regard, this study aims to propose an efficient scheme for data hiding to show the feasibility of exploiting these channels for covert communications. To this end, the authors propose new suboptimal but practical schemes based on additive and multiplicative spread spectrum methods. The analytical evaluations of the proposed techniques along with simulation results show proper efficiency of these schemes. Moreover, it is shown that the proposed scheme based on the M-ary bi-orthogonal general maximum likelihood and M-ary bi-orthogonal generalised embedding of multiplicative watermarks techniques outperform the other proposed schemes in this study. Experimental evaluation confirms that the proposed data hiding scheme benefits from an acceptable level of imperceptibility. Finally, the authors propose a security block which considerably increases the robustness of proposed structures against histogram-based steganalysis.

[1]  S. Gazor,et al.  Speech probability distribution , 2003, IEEE Signal Processing Letters.

[2]  Vasilis Friderikos,et al.  Cross-Layer Optimization to Maximize Fairness Among TCP Flows of Different TCP Flavors , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[3]  Z. Jane Wang,et al.  An Improved Multiplicative Spread Spectrum Embedding Scheme for Data Hiding , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Thomas S. Huang,et al.  An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..

[5]  Qingzhong Liu,et al.  Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[6]  Naofumi Aoki Potential of Value-Added Speech Communications by Using Steganography , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[7]  Jeff T. Linderoth,et al.  Algorithms and Software for Convex Mixed Integer Nonlinear Programs , 2012 .

[8]  Mauro Barni,et al.  A universal technique to hide traces of histogram-based image manipulations , 2012, MM&Sec '12.

[9]  Shanyu Tang,et al.  An Approach to Information Hiding in Low Bit-Rate Speech Stream , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[10]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[11]  Fernando Pérez-González,et al.  Optimal counterforensics for histogram-based forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[12]  Wojciech Mazurczyk,et al.  VoIP steganography and its Detection—A survey , 2012, ACM Comput. Surv..

[13]  Quincy Wu,et al.  Information Hiding in Real-Time VoIP Streams , 2007, ISM 2007.

[14]  Qiang Cheng,et al.  Generalized Embedding of Multiplicative Watermarks , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Z. Jane Wang,et al.  Efficient blind decoders for additive spread spectrum embedding based data hiding , 2012, EURASIP J. Adv. Signal Process..

[16]  Jidong Zhong,et al.  An Enhanced Multiplicative Spread Spectrum Watermarking Scheme , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Asoke K. Nandi,et al.  Speech modelling based on generalized Gaussian probability density functions , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[18]  Sen Bai,et al.  Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.

[19]  Yongfeng Huang,et al.  Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Jana Dittmann,et al.  Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set , 2005, IS&T/SPIE Electronic Imaging.

[21]  Fernando Pérez-González,et al.  Spread-Spectrum Watermarking Security , 2009, IEEE Transactions on Information Forensics and Security.

[22]  Wei Yang,et al.  G.711-Based Adaptive Speech Information Hiding Approach , 2006, ICIC.

[23]  Xing Li,et al.  Steganography-Oriented Noisy Resistance Model of G.729a , 2006, The Proceedings of the Multiconference on "Computational Engineering in Systems Applications".

[24]  W. Gangbo,et al.  The geometry of optimal transportation , 1996 .