Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication

IEEE Transactions on Industrial Electronics(2021)

引用 8|浏览8
暂无评分
摘要
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. VoIP streams can be used as innocuous cover objects to hide the secret data in steganographic systems. The security offered by VoIP signaling protocols is likely to be compromised due to a sharp increase in computing power. This article describes a theoretical and experimental investigation of covert steganographic communications over VoIP streaming media. A new information-theoretical model of secure covert VoIP communications was constructed to depict the security scenarios in steganographic systems against the passive attacks. A one-way accumulation-based steganographic algorithm was devised to integrate dynamic key updating and exchange with data embedding and extraction, so as to protect steganographic systems from adversary attacks. The theoretical analysis of steganographic security using information theory proves that the proposed model for covert VoIP communications is secure against a passive adversary. The effectiveness of the steganographic algorithm for covert VoIP communications was examined by means of performance and robustness measurements. The results reveal that the algorithm has no or little impact on real-time VoIP communications in terms of imperceptibility, speech quality, and signal distortion, and is more secure and effective at improving the security of covert VoIP communications than the other related algorithms with the comparable data embedding rates.
更多
查看译文
关键词
Authentication,covert communication,key distribution,steganography,Voice over Internet Protocol (VoIP)
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要