VoIP Steganography and Its Detection – A Survey 1 ACM Computing Surveys (CSUR) Volume 46 Issue 2, November 2013 WOJCIECH MAZURCZYK Warsaw University of.

Slides:



Advertisements
Similar presentations
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Voice over IP: A growing cadre of criminals is hiding secret messages in voice data. From: "Voice Over IP: The VoIP Steganography Threat". IEEE Spectrum.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
ECE643 DIGITAL IMAGE PROCESSING Steganalysis versus Splicing detection Paper by: Yun Q. Shi, Chunhua Chen, Guorong Xuan and Wei Su By: Nehal Patel Siddharth.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
Toward Semantic Indexing and Retrieval Using Hierarchical Audio Models Wei-Ta Chu, Wen-Huang Cheng, Jane Yung-Jen Hsu and Ja-LingWu Multimedia Systems,
Overview of Digital Stenography
Video Quality Evaluation for Wireless Transmission with Robust Header Compression P. Seeling and M. Reisslein and F.H.P. Fitzek and S. Hendrata Fourth.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
A Study on Quality of Service Issues in Internet Telephony  IP Telephony – Applications and Services  Advantages and benefits of Voice over IP  Technical.
A Tool for Describing and Evaluating Hierarchical Real-Time Bus Scheduling Policies Author: Trevor Meyerowitz, Claudio Pinello, Alberto DAC2003, June 24,2003.
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Computer Networks: Multimedia Applications Ivan Marsic Rutgers University Chapter 3 – Multimedia & Real-time Applications.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
MUMT611: Music Information Acquisition, Preservation, and Retrieval Presentation on Timbre Similarity Alexandre Savard March 2006.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Mel-Cepstrum Based Steganalysis for VoIP-Steganography Christian Kraetzer and Jana Dittmann Electronic Imaging International Society for Optics and.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Header Compression over Cellular LinksLars-Erik Jonsson, Header Compression for IP-Telephony over Cellular Links Lars-Erik Jonsson (Ericsson.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Introduction to Steganalysis Schemes Multimedia Security.
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Yongfeng Huang;Rui Miao Department of Electronic Engineering,
Speaker :梁景棠 Advisor :許子衡 Class :碩資工一甲 Student ID : MA2G0107 Author : Chin-Feng Lai Han-Chieh Chao Published : 2013 Cloud-Assisted Real-Time transrating.
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Covert Channels in IPv6 Norka B. Lucena, Grzegorz Lewandowski, and Steve J. Chapin Syracuse University PET 2005, Cavtat, Croatia May 31 st, 2005.
Cryptographic Anonymity Project Alan Le
Doc.: IEEE /1263r2 Submission Dec 2009 Z. Chen, C. Zhu et al [Preliminary Simulation Results on Power Saving] Date: Authors: Slide.
3GPP2 Evolution Workshop Multimedia Codecs and Protocols 3GPP2 TSG-C SWG1.2.
Video Quality Evaluation for Wireless Transmission with Robust Header Compression Fourth International Conference on Information, Communications & Signal.
A Low-Complexity Universal Architecture for Distributed Rate-Constrained Nonparametric Statistical Learning in Sensor Networks Avon Loy Fernandes, Maxim.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
HICCUPS: Hidden Communication System for Corrupted Networks From: The Tenth International MultiConference on Advanced Computer Systems ACS'2003. Midzyzdroje.
Efficient Multiplexing Method for Voice Streams over Internet Researcher: Mosleh Abu-Alhaj Supervisors: Assoc. Prof. Dr Sureswaran Ramadass Dr Omar Amer.
DIGITAL COMMUNICATION. Introduction In a data communication system, the output of the data source is transmitted from one point to another. The rate of.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Presenter: Kuei-Yu Hsu Advisor: Dr. Kai-Wei Ke 2013/9/30 Performance analysis of video streaming on different hybrid CDN & P2P infrastructure.
Adaptive VoIP Steganography for Information Hiding within Network Audio Streams International Conference on Network-Based Information Systems Author(s):
Using Speech Recognition to Predict VoIP Quality
Digital Steganography
Steganography in WebP image using LSB embedding
Artist Identification Based on Song Analysis
Adnan Quadri & Dr. Naima Kaabouch Optimization Efficiency
Model-based Steganography
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Remote Demos Remote Demo.
Visit for more Learning Resources
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
[Preliminary Simulation Results on Power Saving]
Deep Learning Hierarchical Representations for Image Steganalysis
[Preliminary Simulation Results on Power Saving]
Qingwen Liu, Student Member, IEEE Xin Wang, Member, IEEE,
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Source: Information Sciences, 2018, accpeted.
Reversible Data Hiding Scheme Using Two Steganographic Images
Data hiding based Hamming code
Dynamic embedding strategy of VQ-based information hiding approach
Information Hiding and Its Applications
LSB matching revisited
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

VoIP Steganography and Its Detection – A Survey 1 ACM Computing Surveys (CSUR) Volume 46 Issue 2, November 2013 WOJCIECH MAZURCZYK Warsaw University of Technology

Outline Introduction Scenarios VoIP Steganography VoIP Steganalysis Conclusion Reference 2

Introduction Steganography is an ancient art that encompasses various information hiding techniques, whose aim is to embed a secret message into a carrier (steganogram). 3

Introduction(cont.) IP telephony is attracting the attention of the steganography research community. It is because of the following features that IP telephony is a perfect carrier for steganographic purposes: It is very popular. The large volume of VoIP data. Potentially high steganographic bandwidth that can be achieved. It involves the combined use of a variety of protocols. It is a real-time service. The VoIP calls are dynamic and of variable length. 4

Introduction(cont.) S1: Steganographic methods that modify protocol PDU (Protocol Data Unit) – network protocol headers or payload field. S2: steganographic methods that modify PDUs’ time relations S3: Hybrid steganographic methods that modify both the content of PDUs and their time relations. 5

Scenarios It is the famous “prisoners' problem” which was first formulated by Simmons in

Scenarios(cont.) Warden, the entity that performs detection (steganalysis). In particular it: is aware that Alice and Bob can be utilising hidden communication to exchange data in a covert manner. has a knowledge of all existing steganographic methods, but not of the one used by Alice and Bob (this, as mentioned earlier, is assumed to be their stego-key). is able to try to detect, and/or interrupt the hidden communication 7

Scenarios(cont.) Model for hidden communication 8

Scenarios(cont.) Every network steganographic method can be described typically by the following set of characteristics: its steganographic bandwidth its undetectability Robustness It is important to measure the steganographic cost: MSE (Mean-Square Error) PSNR (Peak Signal-to-Noise Ratio) 9

VoIP Steganography Steganographic methods applied to voice payload: LSB-based methods applied to digital voice signal Other methods 10

VoIP Steganography(cont.) Steganographic methods applied to VoIP-specific protocols: Methods that modify PDU’s time relations Methods that modify protocol PDU – protocol specific fields Hybrid methods 11

VoIP Steganalysis For network steganography, as well as for digital media steganography, there is still no universal, “one size fits all” detection solution. SVM (Support Vector Machine) is utilized which is state of the art solution for steganalysis in general. SVM Statistical steganalysis for LSB-based VoIP steganography was proposed by Dittmann et al. [2005]. (99%) Takahasi and Lee [2007] described a detection method based on calculating the distances between each audio signal and its de-noised residual by using different audio quality metrics. (LSB, DSSS, FHSSS are 94% and Echo hiding methods is 73%) 12

VoIP Steganalysis(cont.) A Mel-Cepstrum based detection, known from speaker and speech recognition, was introduced by Krätzer and Dittmann [2007] (detection of an LSB-based steganography is efficient with a success rate of 100%.) Steganalysis of LSB steganography based on a sliding window mechanism and an improved variant of the previously known Regular Singular (RS) algorithm was proposed by Huang et al. [2011c] (64% decrease in the detection time over the classic RS) Huang et al. [2011d] also introduced the steganalysis method for compressed VoIP speech that is based on second statistics. 13

VoIP Steganalysis(cont.) A method for detecting CNV-QIM (Complementary Neighbour Vertices- Quantisation Index Modulation) steganography in G voice streams was described Li and Huang [2012]. (an average detecting success rate of 96% when the duration of the G compressed speech bit stream is less than 5 seconds.) A steganalysis method for TranSteg based on MFCC (Mel-Frequency Cepstral Coefficients) parameters and GMMs (Gaussian Mixture Models) was developed and tested for various overt/covert codec pairs in a single warden scenario with double transcoding [Janicki et al. 2012b]. (G.711/G.726, with an average detection probability of 94.6%, Speex7/G.729 with 89.6%, or Speex7/iLBC, with 86.3% detectability) 14

Conclusion Surprisingly, a lot of research effort is still devoted for improving methods like LSB. Little effort has been devoted to the deployment of the methods that modify the time relations between packets in the RTP stream, which is an important branch of the network steganography field. Each method must be carefully evaluated due to specific requirements for IP telephony as a real-time service. 15

Conclusion(cont.) New concept for VoIP enviroment New application for VoIP Extension of existing VoIP method Undetectability Robustness Steanography bandwith Comparison chart could be better if author added the name of the method. 16

17 Q&A

Reference 18 SIMMONS, G.J The prisoner’s problem and the subliminal channel. In Advances in Cryptology: Proceedings of CRYPTO ’83. Plenum Press, Santa Barbara, California, USA ZANDER, S., ARMITAGE, G., BRANCH, P A survey of covert channels and countermeasures in computer network protocols, IEEE Commun Surv Tutor 9(3):44–57 WANG, C., WU, W Information hiding in real-time VoIP streams, In Proc. of 9th IEEE Int Symp Multimedia (ISM 2007), Taichung, Taiwan, 255– 262

19 ‘Ta’