An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Yongfeng Huang;Rui Miao Department of Electronic Engineering,

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Efficient Bit Allocation and CTU level Rate Control for HEVC Picture Coding Symposium, 2013, IEEE Junjun Si, Siwei Ma, Wen Gao Insitute of Digital Media,
Fifth International Conference on Information
A Tool for Describing and Evaluating Hierarchical Real-Time Bus Scheduling Policies Author: Trevor Meyerowitz, Claudio Pinello, Alberto DAC2003, June 24,2003.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
AUDIO COMPRESSION msccomputerscience.com. The process of digitizing audio signals is called PCM PCM involves sampling audio signal at minimum rate which.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Function Computation over Heterogeneous Wireless Sensor Networks Xuanyu Cao, Xinbing Wang, Songwu Lu Department of Electronic Engineering Shanghai Jiao.
Optimal Histogram-pair and Prediction-error Based Image Reversible Data Hiding 1 Computer Science, Tongji University, Shanghai, China 2 ECE, New Jersey.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Improvement of Multi-bit Information Embedding Algorithm for Palette-Based Images Anu Aryal, Kazuma Motegi, Shoko Imaizumi and Naokazu Aoki Division of.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
An Adaptive Steganography Scheme for Voice over IP Hui Tian ; Ke Zhou ; Hong Jiang ; Yongfeng Huang ; Jin Liu ; Dan Feng Circuits and Systems, ISCAS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Qingchun Ren and Qilian Liang Department of Electrical Engineering, University of Texas at.
Introduction to Steganalysis Schemes Multimedia Security.
Wireless communications and mobile computing conference, p.p , July 2011.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Overload Prediction Based on Delay in Wireless OFDMA Systems E. O. Lucena, F. R. M. Lima, W. C. Freitas Jr and F. R. P. Cavalcanti Federal University of.
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
Design of Technical Condition Monitoring System of Vehicle Based on CAN Bus Authors : Ruili Zeng, Yunkui Xiao Department of Automobile Engineering Academy.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Background 2 Outline 3 Scopus publications 4 Goal and a signal model 5Harmonic signal parameters estimation.
VoIP Steganography and Its Detection – A Survey 1 ACM Computing Surveys (CSUR) Volume 46 Issue 2, November 2013 WOJCIECH MAZURCZYK Warsaw University of.
Adaptive QoS Control of Multimedia Transmission Over Band-limited Networks Presenter: Hu Huang Nov G.Y.Hong 1, Member, IEEE, A.C.M.Fong 1, Member,
Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/11/16 1 Steganalysis of LSB matching based on statistical modeling of pixel difference distributions.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
Minimum Cost Scheduling of Stored Video in Dynamic Bandwidth Allocation Networks Reporter : M 張益瑞 IEEE Transactions on Consumer Electronics, Vol.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
1 Speech Compression (after first coding) By Allam Mousa Department of Telecommunication Engineering An Najah University SP_3_Compression.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Adaptive VoIP Steganography for Information Hiding within Network Audio Streams International Conference on Network-Based Information Systems Author(s):
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Robust Data Hiding for MCLT Based Acoustic Data Transmission
Spread Spectrum Audio Steganography using Sub-band Phase Shifting
Model-based Steganography
Reversible Data Hiding in JPEG Images using Ordered Embedding
QR Code Authentication with Embedded Message Authentication Code
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
A Restricted Region-based Data-hiding Scheme
Source: Information Sciences, 2018, accpeted.
Data hiding based Hamming code
A High Embedding Capacity Approach to Adaptive Steganography
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
High Capacity Data Hiding for Grayscale Images
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
New Framework for Reversible Data Hiding in Encrypted Domain
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
LSB matching revisited
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Yongfeng Huang;Rui Miao Department of Electronic Engineering, Tsinghua University, Beijing, China Communications (ICC), 2011 IEEE International Conference on Speaker:Nillson 1

Outline Introduce Related works Adaptive steganography in VOIP Experimental results and analysis Conclusion References 2

Introduce This paper presents an adaptive steganography scheme that selects lower embedding bit rate in the flat blocks, while chooses higher embedding bit rate in the sharp blocks. They design an overflow judgment to guarantee the synchronous secret data transmission.the proposed adaptive scheme outperformed the LSB and could evade RS steganalysis. This proposed scheme is efficient, simple and can be used in real-time VoIP network with high hiding capacity. 3

Related works DPCM: Differential PCM ADPCM: Adaptive DPCM M-sequence (Maximum length sequence) : – LFSR(linear-feedback shift register) 4

Adaptive steganography in VOIP The model of covert communication based on VoIP Embedding algorithm – Block division rule – Adaptive embedding scheme based on the smoothness of the block. – Overflow judgment Retrieving algorithm 5

Adaptive steganography in VOIP(cont.) The model of covert communication based on VoIP 6

Adaptive steganography in VOIP(cont.) Embedding algorithm – Block division rule 7

Adaptive steganography in VOIP(cont.) 8 Embedding algorithm – Adaptive embedding scheme based on the smoothness of the block.

Adaptive steganography in VOIP(cont.) Embedding algorithm – Adaptive embedding scheme based on the smoothness of the block. 9

Adaptive steganography in VOIP(cont.) Retrieving algorithm – According to the same principles and the identical parameters as the embedding algorithm, when the sample value is no overflow, the embedded secret message can be retrieved synchronously 10

Experimental results and analysis Objective Testing for the Speech Quality – Overall Test 11

Experimental results and analysis(cont.) 12 Objective Testing for the Speech Quality – Characteristic curve of

Experimental results and analysis(cont.) 13 Objective Testing for the Speech Quality – Characteristic curve of N

Experimental results and analysis(cont.) Subjective Testing based ABX method 14

Experimental results and analysis(cont.) Performance against the RS Steganalysis 15

Conclusion adopting an adaptive steganography scheme to embed different size of secret data in speech stream according to the smoothness of speech block. Compared with LSB method at the same hiding capacity, our proposed scheme could achieve much better speech quality,revealing the sufficient capacity and superior security.Specifically, around 7.5 kbps of secret information could be embedded while the degradation of the MOS-LQO value is less than 0.5. Besides, compared with the vulnerable security of LSB method, They proposed method could substantially evade the current steganalysis like RS detection. Depending on required application background, the proposed algorithm determines the tradeoff between the embedding capacity and the degradation of speech quality by selecting the appropriate parameters of block length, and the overflow threshold. 16

References ADPCM – %5B%E8%BD%89%E9%8C%84%5Dadpcm %5B%E8%BD%89%E9%8C%84%5Dadpcm M-sequence – B. Xiao, Y. Huang."Modeling an optimizing of the information hiding communication system over streaming media,"Journal of Xidian University, Chinese, 2008, Vol35,University, Chinese, 2008, Vol3 B. Xiao, Y. Huang."Modeling an optimizing of the information hiding communication system over streaming media,"Journal of Xidian University, Chinese, 2008, Vol35,University, Chinese, 2008, Vol 17