2009 IEEE International Symposium on Circuits and Systems 2009
DOI: 10.1109/iscas.2009.5118414
|View full text |Cite
|
Sign up to set email alerts
|

An adaptive steganography scheme for voice over IP

Abstract: Abstract-This paper presents an adaptive steganography scheme for Voice over IP (VoIP). Differing from existing steganography techniques for VoIP, this scheme enhances the embedding transparency by taking into account the similarity between Least Significant Bits (LSBs) and embedded messages. Moreover, we introduce the notion of Partial Similarity Value (PSV). By properly setting the threshold PSV, we can adaptively balance the embedding transparency and capacity. We evaluate the effectiveness of this scheme w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 32 publications
(24 citation statements)
references
References 10 publications
0
24
0
Order By: Relevance
“…DPCF (Dynamic Point Coordination Function) scheme was proposed allowing VOIP packets to be transmitted during CP only, when more than one packet is present in an STA's queue [17].The CSR (Compressed Speaker Recognition) builds selective features directly from the already compressed VOIP packet. It reduces the requirement of memory buffer and also increases the scalability [18].Then a scheme for speech hiding was proposed in which, the hiding of a secret speech into the cover speech was done to protect the secret speech from perception [19].The performance of different audio CODECs (G.711, G.723.1, G.726 ADPCM, GSM, G.728 LC CELP, G.729 and G.729 CS-ACELP) was studied and the simulation results shows that G.723.1 audio codec in WLAN gives a least Packet end-to-end delay and Packet Delay variation and thus proved to provide an acceptable user satisfaction for WLAN VOIP [20].An adaptive steganography scheme for VOIP was proposed which proves that adaptive steganography better performs than the traditional one [21]. Since wireless means can degrade VOIP quality because of random packet losses and heavy replication be a very effective method to save these losses [22].…”
Section: Literature Backgroundmentioning
confidence: 99%
“…DPCF (Dynamic Point Coordination Function) scheme was proposed allowing VOIP packets to be transmitted during CP only, when more than one packet is present in an STA's queue [17].The CSR (Compressed Speaker Recognition) builds selective features directly from the already compressed VOIP packet. It reduces the requirement of memory buffer and also increases the scalability [18].Then a scheme for speech hiding was proposed in which, the hiding of a secret speech into the cover speech was done to protect the secret speech from perception [19].The performance of different audio CODECs (G.711, G.723.1, G.726 ADPCM, GSM, G.728 LC CELP, G.729 and G.729 CS-ACELP) was studied and the simulation results shows that G.723.1 audio codec in WLAN gives a least Packet end-to-end delay and Packet Delay variation and thus proved to provide an acceptable user satisfaction for WLAN VOIP [20].An adaptive steganography scheme for VOIP was proposed which proves that adaptive steganography better performs than the traditional one [21]. Since wireless means can degrade VOIP quality because of random packet losses and heavy replication be a very effective method to save these losses [22].…”
Section: Literature Backgroundmentioning
confidence: 99%
“…In [3], Aoki proposed a steganographic method based on the characteristics of pulse code modulation (PCMU) in which the zeroth speech sample can be represented by two codes due to the overlap. Another LSB-based method was proposed by Tian et al [38]. The authors incorporated the m-sequence technique to eliminate the correlation among secret messages to resist statistical detection.…”
Section: Related Workmentioning
confidence: 99%
“…The authors incorporated the m-sequence technique to eliminate the correlation among secret messages to resist statistical detection. A similar approach, also LSB-based, relying on adaptive VoIP steganography was presented by the same authors in [39]; a proof of concept tool, StegTalk, was also developed. In [43] Xu and Yang proposed an LSB-based method dedicated to voice transmission using the G.723.1 codec in 5.3 kbps mode.…”
Section: Related Workmentioning
confidence: 99%
“…M oreover, the derivative-based approach outperforms the wavelet-based approach. Other works in the area of audio steganalysis are found in [27][28][29].…”
Section: Audio Steganography and Steganalysismentioning
confidence: 99%