103 research outputs found

    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

    Full text link
    Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer. They enrich this transfer with features such as reliability, dynamic overlay routing, or performance optimization --- just to mention a few. We present different design approaches for the embedding of hidden channels with micro protocols in digitized audio signals under consideration of different requirements. On the basis of experimental results, our design approaches are compared, and introduced into a protocol engineering approach for micro protocols.Comment: 20 pages, 7 figures, 4 table

    Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography

    Get PDF
    Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet. In this study an Active Voice Period Detection algorithm is devised for PCM codec to detect whether a VoIP packet carries active or inactive voice data, and the data embedding location in a VoIP stream is chosen randomly according to random sequences generated from a logistic chaotic map. The initial parameters of the chaotic map and the selection of where to embed the message are negotiated between the communicating parties. Steganography experiments on active and inactive voice periods were carried out using a VoIP communications system. Performance evaluation and security analysis indicates that the proposed VoIP steganographic scheme can withstand statistical detection, and achieve secure real-time covert communications with high speech quality and negligible signal distortion

    Universal steganography model for low bit-rate speech codec

    Get PDF
    Low bit-rate speech codec offers so many advantages over other codecs that it has become increasingly popular in audio communications such as mobile and VoIP (Voice over Internet Protocol) communications, and thus researching steganography in low bit-rate speech codec is of important significance. In this study, we proposed a universal VoIP steganography model for low bit-rate speech codec that uses the PESQ deterioration rate and the decoding error to automatically choose a data embedding algorithm for each VoIP bitstream, which enables ones to achieve covert communications using a low bit-rate speech codec efficiently and securely. Since no or little attention has been paid to steganography in iSAC (Internet Speech Audio Codec), it was chosen as the test codec to verify the effectiveness, security, and practicability of the proposed steganography model. The experimental results show that, with the proposed steganography model, it achieved the average PESQ deterioration rate of 4.04% (less than 5%, indicating strong imperceptibility) and a high data hiding capacity up to 12 bits/frame (400 bits/second, three times larger than other methods), and the proposed steganography model could effectively resist the latest steganalysis

    Secure covert communications over streaming media using dynamic steganography

    Get PDF
    Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out. A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance. The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process. A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel. The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms

    Covert communication over VoIP streaming media with dynamic key distribution and authentication

    Get PDF
    Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. VoIP streams can be used as innocuous cover objects to hide the secret data in steganographic systems. The security offered by VoIP signaling protocols is likely to be compromised due to a sharp increase in computing power. This article describes a theoretical and experimental investigation of covert steganographic communications over VoIP streaming media. A new information-theoretical model of secure covert VoIP communications was constructed to depict the security scenarios in steganographic systems against the passive attacks. A one-way accumulation-based steganographic algorithm was devised to integrate dynamic key updating and exchange with data embedding and extraction, so as to protect steganographic systems from adversary attacks. The theoretical analysis of steganographic security using information theory proves that the proposed model for covert VoIP communications is secure against a passive adversary. The effectiveness of the steganographic algorithm for covert VoIP communications was examined by means of performance and robustness measurements. The results reveal that the algorithm has no or little impact on real-time VoIP communications in terms of imperceptibility, speech quality, and signal distortion, and is more secure and effective at improving the security of covert VoIP communications than the other related algorithms with the comparable data embedding rates

    A Network Algorithm for 3D/2D IPTV Distribution using WiMAX and WLAN Technologies

    Full text link
    The final publication is available at link.springer.comThe appearance of new broadband wireless technologies jointly with the ability to offer enough quality of service to provide IPTV over them, have made possible the mobility and ubiquity of any type of device to access the IPTV network. The minimum bandwidth required in the access network to provide appropriate quality 3D/2D IPTV services jointly with the need to guarantee the Quality of Experience (QoE) to the end user, makes the need of algorithms that should be able to combine different wireless standards and technologies. In this paper, we propose a network algorithm that manages the IPTV access network and decides which type of wireless technology the customers should connect with when using multiband devices, depending on the requirements of the IPTV client device, the available networks, and some network parameters (such as the number of loss packets and packet delay), to provide the maximum QoE to the customer. The measurements taken in a real environment from several wireless networks allow us to know the performance of the proposed system when it selects each one of them. The measurements taken from a test bench demonstrate the success of our system.This work has been partially supported by the Polytechnic University of Valencia, though the PAID-15-10 multidisciplinary projects, by the Instituto de Telecomunicacoes, Next Generation Networks and Applications Group (NetGNA), Portugal, and by National Funding from the FCT - Fundacao para a Ciencia e a Tecnologia through the PEst-OE/EEI/LA0008/2011 Project.Lloret, J.; CĂĄnovas Solbes, A.; Rodrigues, JJPC.; Lin, K. (2013). A Network Algorithm for 3D/2D IPTV Distribution using WiMAX and WLAN Technologies. Multimedia Tools and Applications. 67(1):7-30. https://doi.org/10.1007/s11042-011-0929-4S730671Abukharis S, MacKenzie R, Farrell TO (2009) Improving QoS of Video Transmitted Over 802.11 WLANs Using Frame Aggregation. London Communications Symposium.. London, United Kingdom, September 03–04Alejandro Canovas, Fernando Boronat, Carlos Turro and Jaime Lloret (2009) Multicast TV over WLAN in a University Campus Network, The Fifth International Conference on Networking and Services (ICNS 2009), Valencia (Spain), April 20–25Alfonsi B (2005) “I want my IPTV: Internet Protocol television predicted a winner,” IEEE Distributed Systems Online, vol.6, no.2Birlik F, Gurbuz Ö, Ercetin O (2009) IPTV Home Networking via 802.11 Wireless Mesh Networks: An Implementation Experience. IEEE Trans. on Consumer Electronics, Vol. 55, No. 3Cai LX, Ling X, Shen X, Mark JW, Cai L (2009) Supporting voice and video applications over IEEE 802.11n WLANs. Wireless Networks 15:443–454Cunningham G, Perry P, Murphy J, Murphy L (2009) Seamless Handover of IPTV Streams in a Wireless LAN Network. Transactions on Broadcasting, IEEE 55(4):796–801Dai Z, Fracchia R, Gosteau J, Pellati P, Vivier G (2008) Vertical Handover Criteria and Algorithm in IEEE802.11 and 802.16 Hybrid Networks, IEEE International Conference on Communications, 2008. ICC’08. Beijing, China, 19–23Gidlund M, Ekling J (2008) VoIP and IPTV distribution over wireless mesh networks in indoor environment. IEEE Trans Consum Electron 54(4):1665–1671Hellberg C, Greene D, Boyes T (2007) Broadband network architectures: designing and deploying triple-play services. Prentice Hall PTR Upper Saddle River, NJ, USAHsu H-T, Kuo F-Y, Lu P-H (2010) Design of WiFi/WiMAX dual-band E-shaped patch antennas through cavity model approach. Microw Opt Technol Lett 52(2):471–474IEEE 802.11 Working Group, At http://www.ieee802.org/11/index.shtml [last access: July 2011]IEEE Std 802.11ℱ-2007 - IEEE Standard for Information Technology— Telecommunications and information exchange between systems— Local and metropolitan area networks—Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) SpecificationsIEEE Std 802.16ℱ-2009, IEEE Standard for Local and metropolitan area networks, Part 16: Air Interface for Broadband Wireless Access Systems. At http://standards.ieee.org/getieee802/download/802.16-2009.pdf [last access: July 2011]inCode Telecom group Inc. (2006) The Quad-Play—the First Wave of the Converged Services Evolution. White paper, FebruaryIPTV Focus Group, Available at http://www.itu.int/ITU-T/IPTV/ [last access: July 2011]Jindal S, Jindal A, Gupta N (2005) Grouping WI-MAX, 3 G and WI-FI for wireless broadband, The First IEEE and IFIP International Conference in Central Asia on Internet 2005, September 26–29, Bishkek, KyrgyzstanJin-Yu Zhang, Man-Gui Liang (2008) “IPTV QoS Implement Mechanism in WLAN,” Int. Conference on Intelligent Information Hiding and Multimedia Signal Processing. pp 117-120, 15–17Karen Fernanda Medina Velez and Ivonne Alexandra Revelo Arias (2006) Diseño y planificaciĂłn de una red inalĂĄmbrica basada en los estandares IEEE 802.16 (WIMAX) y 802.11 (WIFI) para proveer de internet de banda ancha a poblaciones de las provincias de Loja y Zamora Chinchipe, Tesis ElectrĂłnica y Telecomunicaciones (IET), Escuela PolitĂ©cnica Nacional, Quito, EcuadorKnightson K, Morita N, Towle T (2005) NGN architecture: generic principles, functional architecture, and implementation. IEEE Commun Mag 43(10):49–56Lai C, Min Chen (2011) Playback-Rate Based Streaming Services for Maximum Network Capacity in IP Multimedia Subsystem, IEEE System Journal, doi: 10.1109/JSYST.2011.2165190Lee K-H, Trong ST, Lee B-G, Kim Y-T (2008) QoS-Guaranteed IPTV Service Provisioning in Home Network with IEEE 802.11e Wireless LAN,” IEEE Network Operations and Management Symposium. pp 71-76Marcelo Atenas, Sandra Sendra, Miguel Garcia, Jaime Lloret (2010) IPTV Performance in IEEE 802.11n WLANs, IEEE Global Communications Conference (IEEE Globecomm 2010), Miami (USA), December 6–10Miguel Garcia, Jaime Lloret, Miguel Edo, Raquel Lacuesta (2009) IPTV Distribution Network Access System Using WiMAX and WLAN Technologies, International Symposium on High Performance Distributed Computing (HPDC 2009), Munich (Germany), June 11–13Park AH, Choi JK (2007) “QoS guaranteed IPTV service over Wireless Broadband network”, The 9th Int. Conference on Advanced Communication Technology 2:1077–1080Retnasothie FE, Ozdemir MK, YÄucek T, Zhang J, Celebi H, Muththaiah R (2006) “Wireless IPTV over WiMAX: Challenges and applications”. IEEE Wamicon, Clearwater, FLSchollmeier G, Winkler C (2004) Providing sustainable QoS in next-generation networks. IEEE Communication Magazine 42(6):102–107She J, Hou F, Ho P-H, Xie L-L (2007) IPTV over WiMAX: Key Success Factors, Challenges, and Solutions [Advances in Mobile Multimedia]. IEEE Commun Mag 45(8):87–93Shihab E, Cai L, Wan F, Gulliver TA, Tin N (2008) Wireless mesh networks for in-home IPTV distribution. IEEE Netw 22(1):52–57Shihab E, Wan F, Cai L, Gulliver A, Tin N (2007) “Performance Analysis of IPTV in Home Networks”, IEEE Global Telecommunications (GLOBECOM 2007), Washington, DC, pp 26–30Singh H, ChangYeul Kvvon, Seong Soo Kim, Chiu Ngo (2008) “IPTV over WirelessLAN: Promises and Challenges,” 5th IEEE Consumer Communications and Networking Conference, pp.626-631Super AG technologies, At http://www.digicom.it/italiano/supporto/WhitePaper/Wireless108M_whitepaper.pdf [last access: July 2011]VLC Media Player, Available at www.videolan.org [last access: July 2011]Wen-Hsing Kuo, Tehuang Liu, Wanjiun Liao (2007) Utility-Based Resource Allocation for Layer-Encoded IPTV Multicast in IEEE 802.16 (WiMAX) Wireless Networks. IEEE International Conference on Communications 2007 (ICC 2007), 24–28. Glasgow, Scotland pp 1754-1759Wireshark Network Protocol Analyzer, Available at www.wireshark.org [last access: July 2011]Xiao Y, Du X, Zhang J, Hu F, Guizani S (2007) Internet protocol television (IPTV): the killer application for the next-generation internet. IEEE Commun Mag 45(11):126–134Yarali A, Rahman S, Mbula B (2008) WIMAX: The innovate Broadband Wireless access technology. Journal of Communications 3(2):53–6

    A New covert channel over RTP

    Get PDF
    In this thesis, we designed and implemented a new covert channel over the RTP protocol. The covert channel modifies the timestamp value in the RTP header to send its secret messages. The high frequency of RTP packets allows for a high bitrate covert channel, theoretically up to 350 bps. The broad use of RTP for multimedia applications, including VoIP, provides plentiful opportunities to use this channel. By using the RTP header, many of the challenges present for covert channels using the RTP payload are avoided. Using the reference implementation of this covert channel, bitrates of up to 325 bps were observed. Speed decreases on less reliable networks, though message delivery was flawless with up to 1% RTP packet loss. The channel is very difficult to detect due to expected variations in the timestamp field and the flexible nature of RTP
    • 

    corecore