منابع مشابه
Steganography harnesses VoIP networks
Covert channels may be dangerous to company networks as they can lead to the leakage of confidential information. However, it is hard to assess what bandwidth of a covert channel poses a serious threat. Generally, it depends on the security policy that is implemented by the organisation concerned. The ideal case will be to eliminate all possibilities of hidden communication, but practically it ...
متن کاملSteganography of VoIP Streams
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols’ fields and is known for IP, UDP or TCP protoc...
متن کاملEfficient Least-significant-bits Steganography for VoIP
For the instantaneity of real-time applications such as voice over Internet protocol (VoIP), the processing delay and efficiency need to be carefully considered. Matrix coding is a widely used coding scheme for steganography to improve the embedding efficiency which means the average hiding bits per covering bit change. In order to take full advantage of it, a classifying least-significant-bits...
متن کاملMel-cepstrum-based steganalysis for VoIP steganography
Steganography and steganalysis in VoIP applications are important research topics as speech data is an appropriate cover to hide messages or comprehensive documents. In our paper we introduce a Mel-cepstrum based analysis known from speaker and speech recognition to perform a detection of embedded hidden messages. In particular we combine known and established audio steganalysis features with t...
متن کاملThe Steganography In Inactive Frames Of Voip
This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which isused extensively in Voice over Internet Protocol (VoIP). This study reveals that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the st...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cybernetics and Information Technologies
سال: 2019
ISSN: 1314-4081
DOI: 10.2478/cait-2019-0004