An Adaptive Steganography Scheme for Voice over IP Hui Tian ; Ke Zhou ; Hong Jiang ; Yongfeng Huang ; Jin Liu ; Dan Feng Circuits and Systems, 2009. ISCAS.

Slides:



Advertisements
Similar presentations
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Advertisements

Voice over IP: A growing cadre of criminals is hiding secret messages in voice data. From: "Voice Over IP: The VoIP Steganography Threat". IEEE Spectrum.
2003/11/251 A High Capacity Distortion-free Data Hiding Algorithm for Palette Image Circuits and Systems, ISCAS May ’ 03. IEE E CNF Authors: Liu.
1 Balanced Cache:Reducing Conflict Misses of Direct-Mapped Caches through Programmable Decoders ISCA 2006,IEEE. By Chuanjun Zhang Speaker: WeiZeng.
Unequal Loss Protection: Graceful Degradation of Image Quality over Packet Erasure Channels Through Forward Error Correction Alexander E. Mohr, Eva A.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Yun CAO Xianfeng ZHAO Dengguo FENG Rennong SHENG Video Steganography with Perturbed Motion Estimation.
An adaptive framework of multiple schemes for event and query distribution in wireless sensor networks Vincent Tam, Keng-Teck Ma, and King-Shan Lui IEEE.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Reversible Data Embedding Using Difference Expansion IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, Aug. 2003, page(s):
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Yongfeng Huang;Rui Miao Department of Electronic Engineering,
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
VoIP Steganography and Its Detection – A Survey 1 ACM Computing Surveys (CSUR) Volume 46 Issue 2, November 2013 WOJCIECH MAZURCZYK Warsaw University of.
On Mitigating the Broadcast Storm Problem with Directional Antennas Sheng-Shih Wang July 14, 2003 Chunyu Hu, Yifei Hong, and Jennifer Hou Dept. of Electrical.
Decentralized Energy-Conserving and Coverage-Preserving Protocols for Wireless Sensor Networks Chi-Fu Huang, Li-Chu Lo, Yu-Chee Tseng, and Wen-Tsuen Chen.
SPIHT algorithm combined with Huffman encoding Wei Li, Zhen Peng Pang, Zhi Jie Liu, 2010 Third International Symposium on Intelligent Information Technology.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
Shadow Detection in Remotely Sensed Images Based on Self-Adaptive Feature Selection Jiahang Liu, Tao Fang, and Deren Li IEEE TRANSACTIONS ON GEOSCIENCE.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Adaptive VoIP Steganography for Information Hiding within Network Audio Streams International Conference on Network-Based Information Systems Author(s):
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Source: IEEE Signal Processing Letters (Accepted)2016
Scalable Speech Coding for IP Networks: Beyond iLBC
PLIP BASED UNSHARP MASKING FOR MEDICAL IMAGE ENHANCEMENT
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Scalable Speech Coding for IP Networks: Beyond iLBC
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Novel Latin Square-based Secret Sharing for M2M Communications
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Steganography Using Magic Matrix
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
Data hiding method using image interpolation
A High Embedding Capacity Approach to Adaptive Steganography
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Chair Professor Chin-Chen Chang Feng Chia University
New Framework for Reversible Data Hiding in Encrypted Domain
An Algorithm for Removable Visible Watermarking
De-clustering and Its Application to Steganography
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Image Based Steganography Using LSB Insertion Technique
Source : Digital Signal Processing. Vol. 73, pp , Feb
LSB matching revisited
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

An Adaptive Steganography Scheme for Voice over IP Hui Tian ; Ke Zhou ; Hong Jiang ; Yongfeng Huang ; Jin Liu ; Dan Feng Circuits and Systems, ISCAS IEEE International Symposium on 1

Outline Introduction Background and definition The Adaptive steganography scheme Evaluation and test Conclusion References 2

Introduction Recently, steganography has drawn increasing attention. Many different steganographic methods for storage media have been proposed in the last few years. Voice over IP (VoIP), as a possible carrier to apply steganography to provide security for secret messages. 3

Background and definition The framework of VoIP steganography LSB(Least Significant bit) PSV (Partial Similarity Value) 4

Background and definition (cont.) Definition 1 (VoIP Steganography): Given the quadruple Ø =, where C is the set of VoIP packet (VoIP stream), M is the set of secret messages with |C| ≥ |M|, E: C × M → C represents the embedding function and D: C → M represents the restituting function. A system with the property that D(E(c, m)) = m for ∀ c ∈ C and m ∈ M is called a VoIP steganography system. 5

Background and definition (cont.) Definition 2 (Similarity Function): Let C be a non-empty set. A function sim: C 2 → (- ∞,1] is called the similarity function on C, for x, y ∈ C, if x = y, sim(x, y) = 1; otherwise, sim(x, y) < 1. Further, the transparency criterion for steganography can be formally described that for ∀ c ∈ C and m ∈ M maximizing the value of the following function: f(c, m)=sim(c, E(c,m)) - 1 6

The Adaptive steganography scheme The adpative embedding process 7

Evaluation and test STEGANOGRAPHY MODES 8

Evaluation and test (cont.) Test One 9

Evaluation and test (cont.) Test Two 10

Conclusion In this paper, we proposed an adaptive steganography scheme for VoIP. The salient advantage of this scheme is that it can adaptively balance the embedding transparency and capacity. Moreover, experimental results demonstrate that our method outperforms the traditional LSBs substitution method. 11

References Hui Tian ; Ke Zhou ; Hong Jiang ; Yongfeng Huang ; Jin Liu ; Dan Feng, An Adaptive Steganography Scheme for Voice over IP, Circuits and Systems, ISCAS IEEE International Symposium on 12