Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Journal of Homeland Security and Emergency Management

Editor-in-Chief: Renda-Tanali, Irmak, D.Sc.

Managing Editor: McGee, Sibel, Ph.D.

4 Issues per year


IMPACT FACTOR 2016: 0.474
5-year IMPACT FACTOR: 0.627

CiteScore 2016: 0.57

SCImago Journal Rank (SJR) 2016: 0.245
Source Normalized Impact per Paper (SNIP) 2016: 0.358

Online
ISSN
1547-7355
See all formats and pricing
More options …

Evaluation of Efficiency of Transcoding Steganography

Artur Janicki
  • Warsaw University of Technology, Institute of Telecommunications Warsaw, Poland, 00-665, Nowowiejska 15/19
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Wojciech Mazurczyk
  • Corresponding author
  • Warsaw University of Technology, Institute of Telecommunications Warsaw, Poland, 00-665, Nowowiejska 15/19
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Krzysztof Szczypiorski
  • Warsaw University of Technology, Institute of Telecommunications Warsaw, Poland, 00-665, Nowowiejska 15/19
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
Published Online: 2014-10-25 | DOI: https://doi.org/10.1515/jhsem-2014-0028

Abstract

Nowadays cyber criminalists’ interest in incorporation of steganography into armory of rogue hackers is on the rise and information hiding techniques are becoming the new black among Black Hats. In this paper we focus on analyzing the efficiency of the recently proposed IP telephony information hiding method called transcoding steganography (TranSteg) that enables hidden communication with a high steganographic bandwidth while retaining good voice quality. Specifically, we focus on analyzing which voice codecs would be the most favourable for TranSteg to minimize the negative influence on voice quality while maximizing the obtained steganographic bandwidth and limiting the risk of detection.

Keywords: information hiding; steganography

References

  • Ahsan, K. and D. Kundur (2002) “Practical Data Hiding in TCP/IP.” In: Proc Workshop Multimedia Security at ACM Multimedia 2002, Juan-les-Pins, France.Google Scholar

  • Andersen, S. V., W. B. Kleijn, R. Hagen, J. Linden, M. N. Murthi and J. Skoglund (2002) “iLBC – A Linear Predictive Coder with Robustness to Packet Losses.” In: IEEE 2002 Workshop Speech Coding, Tsukuba, Japan, pp. 23–25.Google Scholar

  • Aoki, N. (2008) “A Technique of Lossless Steganography for G.711 Telephony Speech.” In: Int Conf Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), Harbin, China, Aug 15–17, pp. 608–611.Google Scholar

  • Bai, L. Y., Y. Huang, G. Hou and B. Xiao (2008) “Covert Channels Based on Jitter Field of the RTCP Header.” In: Int Conf Intelligent Information Hiding and Multimedia Signal Processing.Google Scholar

  • Bender, W., D. Gruhl, N. Morimoto and A. Lu (1996) “Techniques for Data Hiding.” IBM. Syst. J., 35(3/4):313–336.Google Scholar

  • CCITT (1990) Recommendation G.726: 40, 32, 24, 16 kbps adaptive differential pulse code modulation (ADPCM).Google Scholar

  • Dittmann, J., D. Hesse and R. Hillert (2005) “Steganography and Steganalysis in Voice-over IP Scenarios: Operational Aspects and First Experiences with a New Steganalysis Tool Set.” In: Proc. SPIE, Vol. 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, pp. 607–618.Google Scholar

  • ETSI (2000) Digital cellular telecommunications system (Phase 2+) (GSM); Full rate speech; Transcoding (GSM 06.10 version 8.1.1 Release 1999).Google Scholar

  • Forbes, C. R. (2009) A New covert channel over RTP. MSc thesis, Rochester Institute of Technology. https://ritdml.rit.edu/bitstream/handle/1850/12883/CForbesThesis8-21-2009.pdf?sequence=1.

  • Goodin, D. (2011) Duqu Spawned by ‘Well-funded Team of Competent Coders’ – World’s First Known Modular Rootkit does Steganography, too, The Register.Google Scholar

  • Grocholewski, S. (1997) “CORPORA – Speech Database for Polish diphones.” In: 5th Europ Conf Speech Communication and Technology Eurospeech ’97, Rhodes, Greece.Google Scholar

  • Hersent, H. (2000) IP Telephony – Packet-based Multimedia Communications Systems. Pearson Education Ltd, London.Google Scholar

  • I)ruid (2007) “Real-time Steganography with RTP.” Technical Report, Sept. http://www.uninformed.org/?v=8&a=3&t=pdf.

  • ITU-T (1998) Recommendation G.711: Pulse code modulation (PCM) of voice frequencies.Google Scholar

  • ITU-T (2001) Recommendation P.862: Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs.Google Scholar

  • ITU-T (2009) Recommendation G.711.0: Lossless compression of G.711 pulse code modulation.Google Scholar

  • Janicki, A. and T. Staroszczyk (2011) “Speaker Recognition from Coded Speech using Support Vector Machines.” In: (I. Habernal, V. Matoušek, eds.) Proc 14th Int Conf Text, Speech and Dialogue (TSD 2011), Lecture Notes on Artificial Intelligence (LNAI) 6836, Springer-Verlag, pp. 291–298.Google Scholar

  • Janicki, A., W. Mazurczyk and K. Szczypiorski (2015) “Influence of Speech Codecs Selection on Transcoding Steganography.” Accepted for publication in Telecommunication Systems: Modelling, Analysis, Design and Management, to be published, ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), Springer US, Journal no. 11235.Google Scholar

  • Jankowski, B., W. Mazurczyk and K. Szczypiorski (2011) “PadSteg: Introducing Inter-Protocol Steganography.” In: Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 52, no. 2, February 2013, pp. 1101–1111.Google Scholar

  • Kabal, P. (2002) TSP Speech Database, Tech Rep, Department of Electrical & Computer Engineering. Montreal, Quebec, Canada: McGill University.Google Scholar

  • Krätzer, C., J. Dittmann, T. Vogel and R. Hillert (2006) “Design and Evaluation of Steganography for Voice-over-IP.” In: Proc IEEE Int Symp Circuits and Systems (ISCAS), Kos, Greece.Google Scholar

  • Lubacz, J., W. Mazurczyk and K. Szczypiorski (2010) “Vice Over IP.” In: IEEE Spectrum, ISSN: 0018-9235, Feb, pp. 40–45.Google Scholar

  • Mazurczyk, W. (2014) “VoIP Steganography and Its Detection – A Survey.” ACM Computing Surveys, 46(2), Article No. 20. Available at: http://onlinelibrary.wiley.com/doi/10.1002/9780470612279.app1/summary.CrossrefGoogle Scholar

  • Mazurczyk, W. and Z. Kotulski (2006) “New Security and Control Protocol for VoIP Based on Steganography and Digital Watermarking.” In: Proc 5th Int Conf Computer Science – Research and Applications (IBIZA 2006), Poland, Kazimierz Dolny, Feb. 9–11.Google Scholar

  • Mazurczyk, W. and J. Lubacz (2010) “LACK – A VoIP Steganographic Method.” Telecommun Syst: Model Anal Des Manag 45(2/3) ISSN: 1018-4864 (print version), ISSN: 1572-9451 (electronic version), pp. 153–163.Google Scholar

  • Mazurczyk, W. and S. Szczypiorski (2008a) “Covert channels in SIP for VoIP signaling.” In: (H. Jahankhani, K. Revett and D. Palmer-Brown, eds.) ICGeS 2008 – Communications in Computer and Information Science (CCIS) 12, Springer Verlag Berlin Heidelberg, Proc 4th Int Conf Global E-security 2008, London, United Kingdom, June 23–25, pp. 65–70.Google Scholar

  • Mazurczyk, W. and S. Szczypiorski (2008b) “Steganography of VoIP Streams.” In: (R. Meersman and Z. Tari, eds.) OTM 2008, Part II – Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc OnTheMove Federated Conferences and Workshops: 3rd Int Symp Information Security (IS’08), Monterrey, Mexico, Nov. 9–14, pp. 1001–1018.Google Scholar

  • Mazurczyk, W., M. Smolarczyk and K. Szczypiorski (2011) “On Information Hiding in Retransmissions.” In: Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 52, no. 2, February 2013, pp. 1113–1121.Google Scholar

  • Mazurczyk, W., P. Szaga and K. Szczypiorski (2012) “Using Transcoding for Hidden Communication in IP Telephony.” In: Multimedia Tools and Applications, Vol. 70, no. 3, June 2014, pp. 2139–2165.Google Scholar

  • Miao, R. and Y. Huang (2011) “An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP.” IEEE Int. Conf. Communications (ICC 2011).Google Scholar

  • Murdoch, S. and S. Lewis (2005) “Embedding Covert Channels into TCP/IP.” Inf Hiding, 247–266.Google Scholar

  • Mykowiecka, A. and J. Waszczuk (2009) “Semantic Annotation of City Transportation Information Dialogues using CRF Method.” Text, Speech and Dialog, TSD 2009 Conf, Pilsen, Czech Republic, LNAI 5729, Springer-Verlag, pp. 411–419.Google Scholar

  • Nishimura, A. (2009) “Steganographic Band width Extension for the AMR Codec of Low-bit-rate Modes.” In: Proc Interspeech 2009, Brighton, UK, Sept 6–10, pp. 2611–2614.Google Scholar

  • Rosenberg, J., H. Schulzrinne, G. Camarillo and A. Johnston (2002) SIP: Session Initiation Protocol. IETF, RFC 3261, June.Google Scholar

  • Sanchez, J. and M. Thioune (2010) AMR Codec in UMTS, ISTE, London, UK. Available at: http://onlinelibrary.wiley.com/doi/10.1002/9780470612279.app1/summary.Crossref

  • Schulzrinne, H., S. Casner, R. Frederick and V. Jacobson (2003) RTP: A Transport Protocol for Real-time Applications. IETF, RFC 3550, July.Google Scholar

  • Takahashi, T. and W. Lee (2007) “An Assessment of VoIP Covert Channel Threats.” In: Proc 3rd Int Conf Security and Privacy in Communication Networks (SecureComm 2007), Nice, France.Google Scholar

  • Tian, H., K. Zhou, H. Jiang, J. Liu, Y. Huang and D. Feng (2009a) “An Adaptive Steganography Scheme for Voice over IP.” IEEE Int Symp Circuits and Systems (ISCAS 2009), Taipei, Taiwan, May 24–27.Google Scholar

  • Tian, H., K. Zhou, H. Jiang, J. Liu, Y. Huang and D. Feng (2009b) “An M-sequence Based Steganography Model for Voice over IP.” IEEE Int Conf Communications (ICC 2009), Dresden, Germany, June 14–18, pp. 1–5.Google Scholar

  • TrendMicro (2014) “Sunsets and Cats Can Be Hazardous to Your Online Bank Account.” Available at: http://blog.trendmicro.com/trendlabs-security-intelligence/sunsets-and-cats-can-be-hazardous-to-your-online-bank-account/.

  • Wang, C. and W. Wu (2007) “Information Hiding in Real-time VoIP Streams.” In: 9th IEEE Int Symp Multimedia (ISM 2007), Taichung, Taiwan, Dec 10–12, pp. 255–262.CrossrefGoogle Scholar

  • Xu, T. and Z. Yang (2009) “Simple and Effective Speech Steganography in G.723.1 Low-rate Codes.” In: Proc Int Conf Wireless Communications & Signal Processing WCSP 2009, Nanjing, China, Nov 13–15, pp. 1–4.Google Scholar

  • Zander, S., G. Armitage and P. Branch (2007) “A Survey of Covert Channels and Countermeasures in Computer Network Protocols.” IEEE Commun Surv Tutor 9(3):44–57, ISSN: 1553-877X.Google Scholar

About the article

Corresponding author: Wojciech Mazurczyk, Warsaw University of Technology, Institute of Telecommunications Warsaw, Poland, 00-665, Nowowiejska 15/19


Published Online: 2014-10-25

Published in Print: 2014-12-01


Citation Information: Journal of Homeland Security and Emergency Management, ISSN (Online) 1547-7355, ISSN (Print) 2194-6361, DOI: https://doi.org/10.1515/jhsem-2014-0028.

Export Citation

©2014 by De Gruyter. Copyright Clearance Center

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

[1]
Artur Janicki, Wojciech Mazurczyk, and Krzysztof Szczypiorski
Security and Communication Networks, 2015, Volume 8, Number 18, Page 3804

Comments (0)

Please log in or register to comment.
Log in