48 research outputs found
Using Transcoding for Hidden Communication in IP Telephony
The paper presents a new steganographic method for IP telephony called
TranSteg (Transcoding Steganography). Typically, in steganographic
communication it is advised for covert data to be compressed in order to limit
its size. In TranSteg it is the overt data that is compressed to make space for
the steganogram. The main innovation of TranSteg is to, for a chosen voice
stream, find a codec that will result in a similar voice quality but smaller
voice payload size than the originally selected. Then, the voice stream is
transcoded. At this step the original voice payload size is intentionally
unaltered and the change of the codec is not indicated. Instead, after placing
the transcoded voice payload, the remaining free space is filled with hidden
data. TranSteg proof of concept implementation was designed and developed. The
obtained experimental results are enclosed in this paper. They prove that the
proposed method is feasible and offers a high steganographic bandwidth.
TranSteg detection is difficult to perform when performing inspection in a
single network localisation.Comment: 17 pages, 16 figures, 4 table
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions
Network steganography conceals the transfer of sensitive information within
unobtrusive data in computer networks. So-called micro protocols are
communication protocols placed within the payload of a network steganographic
transfer. They enrich this transfer with features such as reliability, dynamic
overlay routing, or performance optimization --- just to mention a few. We
present different design approaches for the embedding of hidden channels with
micro protocols in digitized audio signals under consideration of different
requirements. On the basis of experimental results, our design approaches are
compared, and introduced into a protocol engineering approach for micro
protocols.Comment: 20 pages, 7 figures, 4 table
Audio Steganography using Modified Enhanced Least Significant Bit in 802.11n
Steganography is a technique to improve the security of
data, which is by inserting messages or confidential information
using a medium called the host or carrier or cover. A wide variety of
digital media can be used as a host, among others audio, image,
video, text, header, IP datagram, and so forth. For audio
steganography, the embedded audio is called stego-audio.
Steganography can be cracked by using steganalysis. By
exploiting the weaknesses of each steganography method. Many
steganography method has been developed to increase its
performance.
This Thesis proposed audio steganography scheme called
MELSB which is modified version of ELSB. This method using
Modified Bit Selection Rule to increase SNR and robustness of
stego-audio. SNR result after applying MELSB scheme is increased.
MELSB scheme also increase robustness of stego-audio. MELSB
still work fine until amplification level 1.07. MELSB also work fine
against noise addition better than ELSB and LSB. It give BER and
CER with value 0 at SNR 33 dB. MELSB work fine in real-time
condition on 802.11n WLAN if there is no transcoding and noise
addition between sender’s and recipient’s compute
A Study on Network Steganography Methods
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the carriers but also the protocols for communication that regulate the path of the carrier through the Internet. This technique is named Network Steganography.
DOI: 10.17762/ijritcc2321-8169.15055