2008 the 9th International Conference for Young Computer Scientists 2008
DOI: 10.1109/icycs.2008.394
|View full text |Cite
|
Sign up to set email alerts
|

A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
31
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 37 publications
(31 citation statements)
references
References 10 publications
0
31
0
Order By: Relevance
“…The main idea behind our proposed new steganography approach, which attempts to strike a good balance between embedding transparency and capacity as detailed next, stems from these observations. Let us assume that, M = {m 1 , m 2 , …, m L } is the bit set of a given secret message (it may be encrypted beforehand, which is irrelevant in this scheme), where L is the length of the secret message; B = {b 1 , b 2 , …, b N } is the LSB set of each VoIP packet, where, N is the total number of LSBs, and the selection of LSBs can refer to previous methods [9]. We divide B into S parts, namely, B = {B' 1 , B' 2 , …, B' S }, where…”
Section: The Adaptive Steganography Scheme For Voipmentioning
confidence: 99%
See 3 more Smart Citations
“…The main idea behind our proposed new steganography approach, which attempts to strike a good balance between embedding transparency and capacity as detailed next, stems from these observations. Let us assume that, M = {m 1 , m 2 , …, m L } is the bit set of a given secret message (it may be encrypted beforehand, which is irrelevant in this scheme), where L is the length of the secret message; B = {b 1 , b 2 , …, b N } is the LSB set of each VoIP packet, where, N is the total number of LSBs, and the selection of LSBs can refer to previous methods [9]. We divide B into S parts, namely, B = {B' 1 , B' 2 , …, B' S }, where…”
Section: The Adaptive Steganography Scheme For Voipmentioning
confidence: 99%
“…Second, a typically short VoIP connection does not give eavesdroppers a sufficient amount of time to detect possible abnormity due to hidden messages. Recently, some researchers have noticed the advantages of and carried out useful studies on steganography over VoIP [5][6][7][8][9]. However, all of these studies adopt the same simple embedding strategy, replacing the least significant bits (LSBs) of the cover speech with the binary bits of secret messages or their encrypted form without leveraging the characteristics of LSBs.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…These methods range from simple techniques that insert information in the form of noise in audio signal to more powerful methodologies using signal processing techniques. Many audio steganography methods use Least Significant Bit (LSB) insertion technique [4,6] to hide the secret message. But techniques have been developed to detect secret message which is present at LSB position [12].…”
Section: Introductionmentioning
confidence: 99%