Covert communications through mobile voice channels

被引:4
|
作者
Kazemi, Reza [1 ]
Rezaei, Roohollah [1 ]
Akhaee, Mohammad A. [2 ]
Behnia, Fereidoon [1 ]
机构
[1] Sharif Univ Technol, Dept Elect & Elect Engn, Tehran, Iran
[2] Univ Tehran, Sch Elect & Comp Engn, Coll Engn, Tehran, Iran
关键词
SPREAD-SPECTRUM WATERMARKING; SCHEME;
D O I
10.1049/iet-ifs.2014.0555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development and growth of cellular mobile networks in recent years has made voice channels widely available almost everywhere. On the other hand, voice dedicated channels possess properties that make them ideal options for high priority real-time secure communications. Beside these realities, information embedding has gained remarkable attention in recent years due to its potential application in multimedia security. In this regard, this study aims to propose an efficient scheme for data hiding to show the feasibility of exploiting these channels for covert communications. To this end, the authors propose new suboptimal but practical schemes based on additive and multiplicative spread spectrum methods. The analytical evaluations of the proposed techniques along with simulation results show proper efficiency of these schemes. Moreover, it is shown that the proposed scheme based on the M-ary bi-orthogonal general maximum likelihood and M-ary bi-orthogonal generalised embedding of multiplicative watermarks techniques outperform the other proposed schemes in this study. Experimental evaluation confirms that the proposed data hiding scheme benefits from an acceptable level of imperceptibility. Finally, the authors propose a security block which considerably increases the robustness of proposed structures against histogram-based steganalysis.
引用
收藏
页码:156 / 164
页数:9
相关论文
共 50 条
  • [41] Covert and Deniable Communications
    Anderson, Ross
    PROCEEDINGS OF THE 6TH ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (IH&MMSEC'18), 2018, : 1 - 1
  • [42] A multimode voice communications system with source-matched error protection for mobile communications
    Babich, F
    Vatta, F
    1997 IEEE 47TH VEHICULAR TECHNOLOGY CONFERENCE PROCEEDINGS, VOLS 1-3: TECHNOLOGY IN MOTION, 1997, : 2007 - 2011
  • [43] Mobile robot system controlled through mobile communications
    Butnaru, T
    Gîrbacia, F
    Tîrziu, F
    Talaba, D
    Product Engineering: Eco-Design, Technologies and Green Energy, 2004, : 433 - 442
  • [44] VOICE TRANSMISSION QUALITY OF MOBILE SATELLITE-COMMUNICATIONS SYSTEMS
    DIMOLITSAS, S
    CORCORAN, FL
    RAVISHANKAR, C
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS, 1994, 12 (04): : 361 - 368
  • [45] Covert channels in IoT deployments through data hiding techniques
    Migliardi, Mauro
    Merlo, Alessio
    Caviglione, Luca
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 559 - 563
  • [46] Robust authentication for automotive control networks through covert channels
    Vanderhallen, Stien
    Van Bulck, Jo
    Piessens, Frank
    Muhlberg, Jan Tobias
    COMPUTER NETWORKS, 2021, 193
  • [47] Secrets Leaking Through Quicksand: Covert Channels in Approximate Computing
    Masciullo, Lorenzo
    Passerone, Roberto
    Regazzoni, Francesco
    Polian, Ilia
    2023 IEEE EUROPEAN TEST SYMPOSIUM, ETS, 2023,
  • [48] Audio steganography with AES for real-time covert voice over internet protocol communications
    ShanYu, Tang
    YiJing, Jiang
    LiPing, Zhang
    ZhangBing, Zhou
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (03) : 1 - 14
  • [49] Audio steganography with AES for real-time covert voice over internet protocol communications
    ShanYu Tang
    YiJing Jiang
    LiPing Zhang
    ZhangBing Zhou
    Science China Information Sciences, 2014, 57 : 1 - 14
  • [50] Audio steganography with AES for real-time covert voice over internet protocol communications
    TANG ShanYu
    JIANG YiJing
    ZHANG LiPing
    ZHOU ZhangBing
    Science China(Information Sciences), 2014, 57 (03) : 76 - 89