Steganalysis of compressed speech to detect covert voice over Internet protocol channels
نویسندگان
چکیده
منابع مشابه
Steganalysis of compressed speech to detect covert voice over Internet protocol channels
A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This paper reveals our findings in analysing the principle of G.723.1 codec that there are ‘unused’ bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detecti...
متن کاملSteganalysis of Compressed Speech to Detect Covert VoIP Channels
A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This paper reveals our findings in analysing the principle of G.723.1 codec that there are ‘unused’ bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detecti...
متن کاملCommunication over the Internet using Covert Channels
A covert channel is a mechanism that can be used to communicate data across network or between processes within the system by violating the networks/ systems security policy and in a manner that goes unnoticed. An effective covert channel is the one that is undetectable by the adversary and can provide high degree of privacy. The goal of the covert channel is to communicate data from one host t...
متن کاملSpeech quality prediction for voice over Internet protocol networks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i Declaration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi List of Abbreviations and Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . xv
متن کاملScalable Hybrid Speech Codec for Voice over Internet Protocol Applications
With the advent of various web-based applications and the fourth generation (4G) access technology, there has been an exponential growth in the demand of multimedia service delivery along with speech signals in a voice over internet protocol (VoIP) setup. Need is felt to fine-tune the conventional speech codecs deployed to cater to the modern environment. This fine-tuning can be achieved by fur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET Information Security
سال: 2011
ISSN: 1751-8709
DOI: 10.1049/iet-ifs.2010.0032