Reliability enhancement and packet loss recovery of any steganographic method in voice over IP

  • PDF / 381,724 Bytes
  • 7 Pages / 595.276 x 790.866 pts Page_size
  • 94 Downloads / 179 Views

DOWNLOAD

REPORT


(0123456789().,-volV)(0123456789(). ,- volV)

Reliability enhancement and packet loss recovery of any steganographic method in voice over IP Parvaneh Amirzade Dana1 • Zahra Esmaeilbeig1 • Mohammad-Reza Sadeghi1

Ó Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract VoIP data is transmitted through a transport protocol called user datagram protocol (UDP) which is intrinsically unreliable. The quality of the voice or multimedia trasmitted during a VoIP session is not much affected after a few packet loss. However, if a secret message is embedded inside VoIP packets using any steganographic method, the integrity of the secret message can be undermined due to the packets being lost during transmission. In this paper, we propose a scheme which is capable of enhancing the reliability of any VoIP steganographic method. We first distribute k message bits into k successive RTP packets. Then, parity bits are used for reconstruction of lost bits caused by packet loss. The implementation of our scheme on matrix embedding using binary Hamming codes steganography results in a reasonable reliability, a good speech quality and a very high steganographic bandwidth of 3050 bps. Keywords Steganography  Voice over IP  UDP Mathematics Subject Classification 05C15  05C20  68Q25

1 Introduction Steganography is the technique that conceals secret information inside an innocent carrier. This carrier, also known as steganographic cover, has evolved from images (JPGs or bitmaps) and sound files (mp3s or WAV files) to video files which can host large secret messages. Voice over IP (VoIP) is an important service of the IP-based network and is rapidly replaced by classical telephony services. Due to the proliferation of VoIP, together with the large volume of voice data transmitted during a call, in recent years this service has shown a stupendously great potential for information hiding [1–3]. The data is kept secret among the bits of a digital voice over the Internet protocol conversation transmitted over the network by means of protocols & Mohammad-Reza Sadeghi [email protected] Parvaneh Amirzade Dana [email protected]

such as SIP, RTP and UDP. Moreover, steganography detection or steganalysis of VoIP data is hard to accomplish due to the ephemerality of the carrier. VoIP steganographic methods presented in the literature can be classified into two main categories. The first category of studies uses the digital representation of the transmitted voice as the steganographic camouflage. The second category targets the VoIP protocol fields such as SIP (signalling protocol), RTP (transport protocol) and RTCP (control protocol). In the following, we will elaborate on some techniques in both cases:

1.1 Previous VoIP steganography Previous approaches for VoIP steganography can be categorized into two distinct groups: first, the conventional embedding methods, which are commonly used in the literature for image, audio and video steganography, can be applied to voice payload. The second category uses different network