Covert communications through mobile voice channels

被引:4
|
作者
Kazemi, Reza [1 ]
Rezaei, Roohollah [1 ]
Akhaee, Mohammad A. [2 ]
Behnia, Fereidoon [1 ]
机构
[1] Sharif Univ Technol, Dept Elect & Elect Engn, Tehran, Iran
[2] Univ Tehran, Sch Elect & Comp Engn, Coll Engn, Tehran, Iran
关键词
SPREAD-SPECTRUM WATERMARKING; SCHEME;
D O I
10.1049/iet-ifs.2014.0555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development and growth of cellular mobile networks in recent years has made voice channels widely available almost everywhere. On the other hand, voice dedicated channels possess properties that make them ideal options for high priority real-time secure communications. Beside these realities, information embedding has gained remarkable attention in recent years due to its potential application in multimedia security. In this regard, this study aims to propose an efficient scheme for data hiding to show the feasibility of exploiting these channels for covert communications. To this end, the authors propose new suboptimal but practical schemes based on additive and multiplicative spread spectrum methods. The analytical evaluations of the proposed techniques along with simulation results show proper efficiency of these schemes. Moreover, it is shown that the proposed scheme based on the M-ary bi-orthogonal general maximum likelihood and M-ary bi-orthogonal generalised embedding of multiplicative watermarks techniques outperform the other proposed schemes in this study. Experimental evaluation confirms that the proposed data hiding scheme benefits from an acceptable level of imperceptibility. Finally, the authors propose a security block which considerably increases the robustness of proposed structures against histogram-based steganalysis.
引用
收藏
页码:156 / 164
页数:9
相关论文
共 50 条
  • [21] Statistical covert channels through PROXY server
    Galatenko, A
    Grusho, A
    Kniazev, A
    Timonina, E
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 424 - 429
  • [22] PERFORMANCE MONITORING THROUGH VOICE COMMUNICATIONS
    DUNHAM, RM
    AMERICAN PSYCHOLOGIST, 1964, 19 (07) : 573 - 573
  • [23] Covert Communications Over Non-Orthogonal Multiple Overt Channels
    Ta, Hien Quang
    Ho-Van, Khuong
    Da Costa, Daniel Benevides
    Kim, Sang Wu
    Oh, Hoon
    IEEE ACCESS, 2022, 10 : 122361 - 122375
  • [24] Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels
    Freche, Guillaume
    Bloch, Matthieu R.
    Barret, Michel
    ENTROPY, 2018, 20 (01):
  • [25] Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels
    Freche, Guillaume
    Bloch, Matthieu R.
    Barret, Michel
    2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,
  • [26] Wireless Covert Communications with Distributed Cooperative Jamming over Fading Channels
    Zhengy, Tong-Xing
    Yang, Ziteng
    Liu, Hao-Wen
    Wen, Yating
    Mu, Pengcheng
    Wang, Hui-Ming
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [27] Second-Order Asymptotics of Covert Communications over Noisy Channels
    Tahmasbi, Mehrdad
    Bloch, Matthieu R.
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2224 - 2228
  • [28] Low-Attention Forwarding for Mobile Network Covert Channels
    Wendzel, Steffen
    Keller, Joerg
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 122 - 133
  • [29] FBMC/OQAM-Based Secure Voice Communications Over Voice Channels
    Cubrilovic, Sara
    Kuzmanovic, Zvezdana
    Punt, Marija
    Vucic, Desimir
    Kovacevic, Branko
    IEEE ACCESS, 2024, 12 : 94452 - 94460
  • [30] Effect of mobile velocity on communications in fading channels
    Chu, MJ
    Stark, WE
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2000, 49 (01) : 202 - 210