Skip to main content
Article thumbnail
Location of Repository

Steganalysis of compressed speech to detect covert voice over Internet protocol channels

By Y. Huang, S. Tang, C. Bao and Yau Jim Yip


A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This study reveals our findings in analysing the principle of G.723.1 codec that there are `unused' bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detection and regression analysis is suggested in this study. The proposed method can not only detect the hidden message embedded in a compressed voice over Internet protocol (VoIP) speech, but also accurately estimate the embedded message length. The method is based on the second statistics, that is, doing a second steganography (embedding information in a sampled speech at an embedding rate followed by embedding another information at a different level of data embedding) in order to estimate the hidden message length. Experimental results have proven the effectiveness of the steganalysis method for detecting the covert channel in the compressed VoIP speech

Topics: QA75, U1
Publisher: Institution of Engineering and Technology
Year: 2011
OAI identifier:

Suggested articles


  1. (2009). An adaptive steganography scheme for Voice over IP’. doi
  2. (1991). An analysis of covert timing channels’. doi
  3. (2008). An approach to information hiding in low bit-rate speech stream’, doi
  4. (2000). Attacks on steganographic systems’. doi
  5. (2006). Audio steganalysis with content-independent distortion measure’, doi
  6. (2006). Design and evaluation of steganography for Voice-over-IP’. doi
  7. (2002). Detecting low embedding rates’. doi
  8. (2001). Detecting LSB steganography in colour and gray-scale images’, doi
  9. (2003). Image steganalysis of bit randomicity’.
  10. (2011). Jim Steganalysis of compressed speech to detect covert voice over Internet protocol channels Original Citation doi
  11. (2007). Mel-Cepstrum based steganalysis for VoIP-steganography’. doi
  12. (2004). Network based intrusion detection to detect steganographic communications channels - on the example of audio data’. doi
  13. (2006). New VoIP traffic security scheme with digital watermarking’. doi
  14. (2002). Practical steganalysis of digital images-state of the art’. Security and Watermarking of Multimedia Contents IV, doi
  15. (2004). Security considerations for Voice over IP systems’. doi
  16. (2005). Steganalysis of audio: Attacking the steghide’. doi
  17. (2007). Steganalytic features for JPEG compression-based perturbed quantization’, doi
  18. (2005). Steganography and steganalysis in Voice-over IP scenarios: operational aspects and first experience with a new steganalysis tool set’. Security, Steganography, and Watermarking of Multimedia Contents VII, doi
  19. (2008). Steganography of VoIP streams’, doi
  20. (2006). Steganography-oriented noisy resistance model of G.729a’, doi
  21. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis’, doi

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.