Covert communications through mobile voice channels

被引:4
|
作者
Kazemi, Reza [1 ]
Rezaei, Roohollah [1 ]
Akhaee, Mohammad A. [2 ]
Behnia, Fereidoon [1 ]
机构
[1] Sharif Univ Technol, Dept Elect & Elect Engn, Tehran, Iran
[2] Univ Tehran, Sch Elect & Comp Engn, Coll Engn, Tehran, Iran
关键词
SPREAD-SPECTRUM WATERMARKING; SCHEME;
D O I
10.1049/iet-ifs.2014.0555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development and growth of cellular mobile networks in recent years has made voice channels widely available almost everywhere. On the other hand, voice dedicated channels possess properties that make them ideal options for high priority real-time secure communications. Beside these realities, information embedding has gained remarkable attention in recent years due to its potential application in multimedia security. In this regard, this study aims to propose an efficient scheme for data hiding to show the feasibility of exploiting these channels for covert communications. To this end, the authors propose new suboptimal but practical schemes based on additive and multiplicative spread spectrum methods. The analytical evaluations of the proposed techniques along with simulation results show proper efficiency of these schemes. Moreover, it is shown that the proposed scheme based on the M-ary bi-orthogonal general maximum likelihood and M-ary bi-orthogonal generalised embedding of multiplicative watermarks techniques outperform the other proposed schemes in this study. Experimental evaluation confirms that the proposed data hiding scheme benefits from an acceptable level of imperceptibility. Finally, the authors propose a security block which considerably increases the robustness of proposed structures against histogram-based steganalysis.
引用
收藏
页码:156 / 164
页数:9
相关论文
共 50 条
  • [31] Enhancing Integrity of Modbus TCP Through Covert Channels
    Taylor, James M., Jr.
    Sharif, Hamid R.
    2017 11TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2017,
  • [32] Understanding and Mitigating Covert Channels Through Branch Predictors
    Evtyushkin, Dmitry
    Ponomarev, Dmitry
    Abu-Ghazaleh, Nael
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2016, 13 (01)
  • [33] Investigating HTTP Covert Channels Through Fuzz Testing
    Holk, Kai
    Mazurczyk, Wojciech
    Zuppelli, Marco
    Caviglione, Luca
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [34] Steganalysis of compressed speech to detect covert voice over Internet protocol channels
    Huang, Y.
    Tang, S.
    Bao, C.
    Yip, Y. J.
    IET INFORMATION SECURITY, 2011, 5 (01) : 26 - 32
  • [35] Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation
    Jiang, Yijing
    Tang, Shanyu
    Zhang, Liping
    Xiong, Muzhou
    Yip, Yau Jim
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2016, 12 (04)
  • [36] Covert Communications with A Full-Duplex Receiver over Wireless Fading Channels
    Hu, Jinsong
    Shahzad, Khurram
    Yan, Shihao
    Zhou, Xiangyun
    Shu, Feng
    Li, Jun
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [37] Building covert timing channels by packet rearrangement over mobile networks
    Zhang, Xiaosong
    Liang, Chen
    Zhang, Quanxin
    Li, Yuanzhang
    Zheng, Jun
    Tan, Yu-an
    INFORMATION SCIENCES, 2018, 445 : 66 - 78
  • [38] Theoretical analyses of data communications integrated into cordless voice channels
    Canchi, R
    Akaiwa, Y
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2001, 50 (01) : 223 - 233
  • [39] Mobile Agents for Detecting Network Attacks Using Timing Covert Channels
    Bieniasz, Jedrzej
    Stepkowska, Monika
    Janicki, Artur
    Szczypiorski, Krzysztof
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (09) : 1109 - 1130
  • [40] Covert Channels Using Mobile Device's Magnetic Field Sensors
    Matyunin, Nikolay
    Szefer, Jakub
    Biedermann, Sebastian
    Katzenbeisser, Stefan
    2016 21ST ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2016, : 525 - 532