48 research outputs found

    Using Transcoding for Hidden Communication in IP Telephony

    Get PDF
    The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt data that is compressed to make space for the steganogram. The main innovation of TranSteg is to, for a chosen voice stream, find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected. Then, the voice stream is transcoded. At this step the original voice payload size is intentionally unaltered and the change of the codec is not indicated. Instead, after placing the transcoded voice payload, the remaining free space is filled with hidden data. TranSteg proof of concept implementation was designed and developed. The obtained experimental results are enclosed in this paper. They prove that the proposed method is feasible and offers a high steganographic bandwidth. TranSteg detection is difficult to perform when performing inspection in a single network localisation.Comment: 17 pages, 16 figures, 4 table

    Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

    Full text link
    Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer. They enrich this transfer with features such as reliability, dynamic overlay routing, or performance optimization --- just to mention a few. We present different design approaches for the embedding of hidden channels with micro protocols in digitized audio signals under consideration of different requirements. On the basis of experimental results, our design approaches are compared, and introduced into a protocol engineering approach for micro protocols.Comment: 20 pages, 7 figures, 4 table

    Audio Steganography using Modified Enhanced Least Significant Bit in 802.11n

    Get PDF
    Steganography is a technique to improve the security of data, which is by inserting messages or confidential information using a medium called the host or carrier or cover. A wide variety of digital media can be used as a host, among others audio, image, video, text, header, IP datagram, and so forth. For audio steganography, the embedded audio is called stego-audio. Steganography can be cracked by using steganalysis. By exploiting the weaknesses of each steganography method. Many steganography method has been developed to increase its performance. This Thesis proposed audio steganography scheme called MELSB which is modified version of ELSB. This method using Modified Bit Selection Rule to increase SNR and robustness of stego-audio. SNR result after applying MELSB scheme is increased. MELSB scheme also increase robustness of stego-audio. MELSB still work fine until amplification level 1.07. MELSB also work fine against noise addition better than ELSB and LSB. It give BER and CER with value 0 at SNR 33 dB. MELSB work fine in real-time condition on 802.11n WLAN if there is no transcoding and noise addition between sender’s and recipient’s compute

    A Study on Network Steganography Methods

    Get PDF
    Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the carriers but also the protocols for communication that regulate the path of the carrier through the Internet. This technique is named Network Steganography. DOI: 10.17762/ijritcc2321-8169.15055
    corecore