Using Signature for Hidden Communication Prevention in IP Telephony

作者: Ajvad Rahman , P. P. Amritha

DOI: 10.1007/978-81-322-2135-7_52

关键词:

摘要: This paper prevents the steganographic method for IP telephony called transcoding steganography (TranSteg). Typically, in TranSteg, it is overt data that to compress make space steganogram. TranSteg finds appropriate codec will result voice quality similar original. In signature-based system, signature of payload appended packet provide integrity. The becomes invalid when there some change data. detects hidden communication between a VoIP call. scheme concept described this paper.

参考文章(12)
Deepa Kundur, Kamran Ahsan, Practical Data Hiding in TCP/IP ,(2002)
C. Kratzer, J. Dittmann, T. Vogel, R. Hillert, Design and evaluation of steganography for voice-over-IP international symposium on circuits and systems. pp. 4- ,(2006) , 10.1109/ISCAS.2006.1693105
Wojciech Mazurczyk, Zbigniew Kotulski, New security and control protocol for VoIP based on steganography and digital watermarking Annales Umcs, Informatica. ,vol. 5, pp. 417- 426 ,(2006) , 10.17951/AI.2006.5.1.417-426
Takehiro Takahashi, Wenke Lee, An assessment of VoIP covert channel threats 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007. pp. 371- 380 ,(2007) , 10.1109/SECCOM.2007.4550357
Chungyi Wang, Quincy Wu, Information Hiding in Real-Time VoIP Streams international symposium on multimedia. pp. 255- 262 ,(2007) , 10.1109/ISM.2007.4412381
Wojciech Mazurczyk, Paweł Szaga, Krzysztof Szczypiorski, Using transcoding for hidden communication in IP telephony Multimedia Tools and Applications. ,vol. 70, pp. 2139- 2165 ,(2014) , 10.1007/S11042-012-1224-8
Andreas Plies, Michael Massoth, Ronald Marx, Approach to Identity Card-Based Voice-over-IP Authentication advances in multimedia. pp. 61- 66 ,(2010) , 10.1109/MMEDIA.2010.30
Jana Dittmann, Danny Hesse, Reyk Hillert, Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set conference on security steganography and watermarking of multimedia contents. ,vol. 5681, pp. 607- 618 ,(2005) , 10.1117/12.586579
Linda Yunlu Bai, Yongfeng Huang, Guannan Hou, Bo Xiao, Covert Channels Based on Jitter Field of the RTCP Header intelligent information hiding and multimedia signal processing. pp. 1388- 1391 ,(2008) , 10.1109/IIH-MSP.2008.169