92 research outputs found

    Covert Voice over Internet Protocol communications based on spatial model

    Get PDF
    This paper presents a new spatial steganography model for covert communications over Voice over Internet Protocol (VoIP), providing a solution to the issue of increasing the capacity of covert VoIP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert VoIP communications. By taking into account the variation characteristics of VoIP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive ste-ganography in media streams. Experimental results on VoIP steganography show that the pro-posed steganographic method effectively depicted the spatial and temporal characteristics of VoIP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert VoIP communications

    Steganography in inactive frames of VoIP streams encoded by source codec

    Get PDF
    This paper describes a novel high capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which is used extensively in Voice over Internet Protocol (VoIP). This study reveals that, contrary to existing thoughts, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the streams, that is, steganography in the inactive audio frames attains a larger data embedding capacity than that in the active audio frames under the same imperceptibility. By analysing the concealment of steganography in the inactive frames of low bit rate audio streams encoded by G.723.1 codec with 6.3kbps, the authors propose a new algorithm for steganography in different speech parameters of the inactive frames. Performance evaluation shows embedding data in various speech parameters led to different levels of concealment. An improved voice activity detection algorithm is suggested for detecting inactive audio frames taking into packet loss account. Experimental results show our proposed steganography algorithm not only achieved perfect imperceptibility but also gained a high data embedding rate up to 101 bits/frame, indicating that the data embedding capacity of the proposed algorithm is very much larger than those of previously suggested algorithms

    Satellite and Fluorescence Remote Sensing for Rice Nitrogen Status Diagnosis in Northeast China

    Get PDF
    Nitrogen (N), as the most important element of crop growth and development, plays a decisive role in ensuring yield. However, the problems of over-application of N fertilizers have been repeatedly reported in China, which resulted in low N use efficiency and high risk of environmental pollution. The requirements of developing technologies for real-time and site-specific diagnosis of crop N status are the foundation to realize the precision N management, and also benefit to the improvement of the N use efficiency. Remote sensing technology provides a promising non-intrusive solution to monitor rice N status and to realize the precision N management over large areas. This research focuses on proposing N nutrition diagnosis methods and developing N fertilizer management strategies for paddy rice of cold regions in Northeast China. The main contents and results are presented as follows: (1)This study developed a new critical N (Nc) dilution curve for paddy rice of cold regions in Northeast China. The curve could be described by the equation Nc=27.7W^(-0.34) if W≥1 t/ha for dry matter (DM) or Nc=27.7g/kg DM if W<1 t/ha, where W is the aboveground biomass. Results indicated that the new Nc dilution curve was suitable for diagnosing short-season Japonica rice N status in Northeast China. The validation result indicated that it worked well to diagnose plant N status of the 11-leaf variety rice. (2)This study investigated the potential of the satellite remote sensing data for diagnosing rice N status and guiding the topdressing N application at the stem elongation stage in Northeast China. 50 vegetation indices (VIs) were computed based on the FORMOSAT-2 satellite data, and they were correlated with the field-based agronomic variables, i.e., aboveground biomass (AGB), leaf area index (LAI), plant N concentration (PNC), plant N uptake (PNU), chlorophyll meter readings, and N nutrition index (NNI, defined as the ratio of actual PNC and critical PNC according to the new Nc dilution curves). The results presented that 45% of variation in the NNI was obtained by using a direct estimation method based on the best VI according to the FORMOSAT-2 satellite data, while 52% of the variation in the NNI was yielded by an indirect estimation method, which firstly used the VIs to estimate AGB and PNU, respectively, then estimated NNI according to these two variables. Moreover, based on the critical N uptake curve, a N recommendation algorithm was proposed. The algorithm was based on the difference between the estimated PNU and the critical PNU to adjust the topdressing N application rate. The results demonstrated that FORMOSAT-2 images have the potential to estimate rice N status and guide panicle N fertilizer applications in Northeast China. (3)This study also evaluated the potential improvements of the newest satellite sensors with the red edge band for diagnosing rice N status in Northeast China. The canopy-scale hyperspectral data were upscaled to simulate the wavebands of RapidEye, WorldView-2, and FORMOSAT-2, respectively. The VI analysis, stepwise multiple linear regression (SMLR), and partial least squares regression (PLSR) were performed to evaluate the N status indicators. The results indicated that the VIs based on the RE band from RapidEye and WorldView-2 data could explain more variability for N indicators than the VIs from FORMOSAT-2 data having no RE band. Moreover, the SMLR and PLSR results revealed that both the near-infrared and red edge band were important for N status estimation. (4)The proximal fluorescence sensor Multiplex_3 was used to evaluate the potential of fluorescence spectrum for estimating the N status of the cold regional paddy rice at different growth stages. The Multiplex indices and their normalized N sufficient indices (NSI) were used to estimate the five N status indicators, i.e., AGB, leaf N concentration (LNC), PNC, PNU, and NNI. The results indicated that there were strong relationships between the fluorescence indices (i.e., BRR_FRF, FLAV, NBI_G, and NBI_R) and (i.e., LNC, PNC, NNI), with the coefficient of determination between 0.40 and 0.78. In particular, NNI was well estimated by these fluorescence indices. Moreover, the NSI data improved the accuracy of the N diagnosis. These results of this study were useful for N nutrition diagnosis and variable fertilization of the cold regional paddy rice, which were significant for the ecological environment protection and the national food security

    Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis

    Get PDF
    The authors describe a reliable and accurate steganalysis method for detecting covert voice-over Internet protocol (VoIP) communication channels. The proposed method utilises a unique sliding window mechanism and an improved regular singular (RS) algorithm for VoIP steganalysis, which detects the presence of least significant bit embedded VoIP streams. With this mechanism, the detection window moves forward one packet or several packets each time to screen VoIP streams. The optimum detection threshold for the proposed detection metric is computed by modelling the distributions of the new metric for stego and cover VoIP streams. Experimental analysis reveals that the proposed method improves the detection time significantly, utilising less memory resources for VoIP steganalysis, thereby enabling real-time detection of stego VoIP streams. The proposed method also provides a significant improvement on precision in detecting multiple covert VoIP channels when compared to the conventional RS method

    Steganography integration into a low-bit rate speech codec

    Get PDF
    Low bit-rate speech codecs have been widely used in audio communications like VoIP and mobile communications, so that steganography in low bit-rate audio streams would have broad applications in practice. In this paper, the authors propose a new algorithm for steganography in low bit-rate VoIP audio streams by integrating information hiding into the process of speech encoding. The proposed algorithm performs data embedding while pitch period prediction is conducted during low bit-rate speech encoding, thus maintaining synchronization between information hiding and speech encoding. The steganography algorithm can achieve high quality of speech and prevent detection of steganalysis, but also has great compatibility with a standard low bit-rate speech codec without causing further delay by data embedding and extraction. Testing shows, with the proposed algorithm, the data embedding rate of the secret message can attain 4 bits / frame (133.3 bits / second)

    A new security architecture for SIP-based P2P computer networks

    Get PDF
    Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e. a trustworthy authentication algorithm of peers, for Session Initialize Protocol (SIP) based P2P computer networks. A mechanism for node authentication using a cryptographic primitive called one-way accumulator is proposed to secure the P2P SIP computer networks. It leverages the distributed nature of P2P to allow for distributed resource discovery and rendezvous in a SIP network, thus eliminating (or at least reducing) the need for centralized servers. The distributed node authentication algorithm is established for the P2P SIP computer networks. The corresponding protocol has been implemented in our P2P SIP experiment platform successfully. The performance study has verified the proposed distributed node authentication algorithm for SIP based P2P computer networks

    Universal steganography model for low bit-rate speech codec

    Get PDF
    Low bit-rate speech codec offers so many advantages over other codecs that it has become increasingly popular in audio communications such as mobile and VoIP (Voice over Internet Protocol) communications, and thus researching steganography in low bit-rate speech codec is of important significance. In this study, we proposed a universal VoIP steganography model for low bit-rate speech codec that uses the PESQ deterioration rate and the decoding error to automatically choose a data embedding algorithm for each VoIP bitstream, which enables ones to achieve covert communications using a low bit-rate speech codec efficiently and securely. Since no or little attention has been paid to steganography in iSAC (Internet Speech Audio Codec), it was chosen as the test codec to verify the effectiveness, security, and practicability of the proposed steganography model. The experimental results show that, with the proposed steganography model, it achieved the average PESQ deterioration rate of 4.04% (less than 5%, indicating strong imperceptibility) and a high data hiding capacity up to 12 bits/frame (400 bits/second, three times larger than other methods), and the proposed steganography model could effectively resist the latest steganalysis

    An Information- Theoretical Model for Streaming Media Based Stegosystems

    Get PDF
    Steganography in streaming media differs from steganography in images or audio files because of the continuous embedding process and the necessary synchronization of sender and receiver due to packet loss in streaming media. The conventional theoretical model for image steganography is not appropriate for explaining the security scenarios for streaming media based stegosystems. In this paper, we propose a new information-theoretical model with two pseudo-random sequences imitating the continuous embedding and synchronization characteristics of streaming media based stegosystems. We also discuss the statistical properties of Voice over Internet Protocol (VoIP) speech streams through theoretical analysis and experimental testing. The experimental results show the bit stream consisting of fixed codebook parameters in speech frames is similar in statistical characteristics to a white-noise sequence. The relative entropy between the VoIP speech stream and the embedded secret message has been found to be zero. This leads us to conclude that the proposed streaming media based stegosystem is secure against statistical detection; in other words, the statistical measures cannot detect the existence of the secret message embedded in VoIP speech streams
    corecore