Adaptive VoIP Steganography for Information Hiding within Network Audio Streams International Conference on Network-Based Information Systems Author(s):

Slides:



Advertisements
Similar presentations
1 Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization CCSEIT 12 October 2012 Audio Steganography Using.
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Voice over IP: A growing cadre of criminals is hiding secret messages in voice data. From: "Voice Over IP: The VoIP Steganography Threat". IEEE Spectrum.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
A KLT-Based Approach for Occlusion Handling in Human Tracking Chenyuan Zhang, Jiu Xu, Axel Beaugendre and Satoshi Goto 2012 Picture Coding Symposium.
11 FPGA based High speed and low area cost pattern matching Authors: Jian Huang, Zongkai Yang, Xu Du, and Wei Liu Publisher: Proceedings of IEEE Symposium.
Study of Transport Protocols performance in Smart Meter networks Student: Sally Advisor: Dr. Quincy Wu Date: 2012/06/30 1.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Determining the Optimal Process Technology for Performance- Constrained Circuits Michael Boyer & Sudeep Ghosh ECE 563: Introduction to VLSI December 5.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Can Cloud Computing be Used for Planning? An Initial Study Authors: Qiang Lu*, You Xu†, Ruoyun Huang†, Yixin Chen† and Guoliang Chen* from *University.
Reversible Data Embedding Using Difference Expansion IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, Aug. 2003, page(s):
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
1 Wave Steganography Approach by Modified LSB 2009 Adviser: 吳坤熹 Student: 陳奕君 Presentation Data:2013/11/5 Second International Conference on Emerging Trends.
National Chi Nan University Study of Network Performance Measurement Based on SNMP The 8 th International Conference on Computer Supported Cooperative.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Mel-Cepstrum Based Steganalysis for VoIP-Steganography Christian Kraetzer and Jana Dittmann Electronic Imaging International Society for Optics and.
A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia.
An Adaptive Steganography Scheme for Voice over IP Hui Tian ; Ke Zhou ; Hong Jiang ; Yongfeng Huang ; Jin Liu ; Dan Feng Circuits and Systems, ISCAS.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Yongfeng Huang;Rui Miao Department of Electronic Engineering,
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
Speaker: Chia-Wen Lu (Sally) Adviser: Dr. Quincy Wu Date:02/23/2012
A Buffer-Aware HTTP Live Streaming Approach for SDN-Enabled 5G Wireless Networks Speaker: Bo-Yu Huang Advisor: Dr. Ho-Ting Wu Date: 2015/04/15 1.
Cryptographic Anonymity Project Alan Le
VoIP Steganography and Its Detection – A Survey 1 ACM Computing Surveys (CSUR) Volume 46 Issue 2, November 2013 WOJCIECH MAZURCZYK Warsaw University of.
SPIHT algorithm combined with Huffman encoding Wei Li, Zhen Peng Pang, Zhi Jie Liu, 2010 Third International Symposium on Intelligent Information Technology.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
DCT watermarking Speaker: Paul 1.
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Energy Efficiency in HEW
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Mean value based reversible data hiding in encrypted images
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Color Image Hidden in a
MPEG-1 Overview of MPEG-1 Standard
An efficient reversible data hiding method for AMBTC compressed images
Paper Survey on QoS Issues of VoIP
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Data hiding based Hamming code
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
Dynamic embedding strategy of VQ-based information hiding approach
A High Embedding Capacity Approach to Adaptive Steganography
Partial reversible data hiding scheme using (7, 4) hamming code
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
EarthTour Presentations
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Sourse: Information Sciences, Vol. 494, pp , August 2019
Privacy Protection for E-Health Systems by
Image Based Steganography Using LSB Insertion Technique
Dynamic improved pixel value ordering reversible data hiding
Source : Digital Signal Processing. Vol. 73, pp , Feb
An Efficient Spatial Prediction-Based Image Compression Scheme
LSB matching revisited
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Lossless Data Hiding in the Spatial Domain for High Quality Images
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Adaptive VoIP Steganography for Information Hiding within Network Audio Streams International Conference on Network-Based Information Systems Author(s): Erchi Xu, Bo Liu, Liyang Xu, Ziling Wei, Baokang Zhao ∗, Jinshu Su

Outline Introduction VAMI VADDI Experimental Results Conclusion Reference 2

Introduction VoIP information Embedding Process. 3

Introduction(cont.) G.711 codec 4

Introduction(cont.) Common hiding process LSB(Least Significant Bits) 5

Introduction(cont.) MOS(Mean Opinion Score). Required 16 experts to obtain MOS. 6

VAMI VAMI(VAlue-based Multiple Insertion) According to PCMU, notation bits are the same. LSB data hiding method is easy to detect. Creating multiple data hiding way by different modes. 7

VAMI(cont.) 8 Pesq(n,t) = MOS nt

VAMI(cont.) The process of VAMI. Only use mode 0~3. 9

VADDI VADDI(Voice Activity Detection Dynamic Insertion) Hiding data in the silent part is easy to be find out. Define a threshold L, if higher than L start hiding, otherwise, stop. 10

VADDI(cont.) 11 Define a threshold L, if higher than L start hiding, otherwise, stop.

Experimental Results 12

Experimental Results(cont.) 13

Conclusion Nowadays, existing VoIP steganography research commonly focus on information hiding in the LSB bits of Network Audio Streams. Existing detection way NVR is targeting on LSB method, so LSB method is not a efficient way for VoIP steganography. Using AVIS method will be more suitable than LSB method. 14

Reference [1] N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security and Privacy, vol. 1, pp. 32–44, May [2] C. Wang and Q. Wu, “Information hiding in real-time voip streams,” in Proceedings of the Ninth IEEE International Symposium on Multimedia, ser. ISM ’07. Washington, DC,USA: IEEE Computer Society, 2007, pp. 255–262. [3] C. Wang, “improved voip security with real-time speech hiding in g.711,” Ph.D. dissertation, National Chi Nan University,