Cargando…

Steganography and Steganalysis in Voice over IP: A Review

The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure...

Descripción completa

Detalles Bibliográficos
Autores principales: Wu, Zhijun, Guo, Junjun, Zhang, Chenlei, Li, Changliang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7913304/
https://www.ncbi.nlm.nih.gov/pubmed/33546240
http://dx.doi.org/10.3390/s21041032
_version_ 1783656774134398976
author Wu, Zhijun
Guo, Junjun
Zhang, Chenlei
Li, Changliang
author_facet Wu, Zhijun
Guo, Junjun
Zhang, Chenlei
Li, Changliang
author_sort Wu, Zhijun
collection PubMed
description The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. Therefore, in recent years, steganography and steganography analysis based on VoIP have gradually become research hotspots in the field of information security. Steganography and steganalysis based on VoIP can be divided into two categories, depending on where the secret information is embedded: steganography and steganalysis based on voice payload or protocol. The former mainly regards voice payload as the carrier, and steganography or steganalysis is performed with respect to the payload. It can be subdivided into steganography and steganalysis based on FBC (fixed codebook), LPC (linear prediction coefficient), and ACB (adaptive codebook). The latter uses various protocols as the carrier and performs steganography or steganalysis with respect to some fields of the protocol header and the timing of the voice packet. It can be divided into steganography and steganalysis based on the network layer, the transport layer, and the application layer. Recent research results of steganography and steganalysis based on protocol and voice payload are classified in this paper, and the paper also summarizes their characteristics, advantages, and disadvantages. The development direction of future research is analyzed. Therefore, this research can provide good help and guidance for researchers in related fields.
format Online
Article
Text
id pubmed-7913304
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-79133042021-02-28 Steganography and Steganalysis in Voice over IP: A Review Wu, Zhijun Guo, Junjun Zhang, Chenlei Li, Changliang Sensors (Basel) Review The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. Therefore, in recent years, steganography and steganography analysis based on VoIP have gradually become research hotspots in the field of information security. Steganography and steganalysis based on VoIP can be divided into two categories, depending on where the secret information is embedded: steganography and steganalysis based on voice payload or protocol. The former mainly regards voice payload as the carrier, and steganography or steganalysis is performed with respect to the payload. It can be subdivided into steganography and steganalysis based on FBC (fixed codebook), LPC (linear prediction coefficient), and ACB (adaptive codebook). The latter uses various protocols as the carrier and performs steganography or steganalysis with respect to some fields of the protocol header and the timing of the voice packet. It can be divided into steganography and steganalysis based on the network layer, the transport layer, and the application layer. Recent research results of steganography and steganalysis based on protocol and voice payload are classified in this paper, and the paper also summarizes their characteristics, advantages, and disadvantages. The development direction of future research is analyzed. Therefore, this research can provide good help and guidance for researchers in related fields. MDPI 2021-02-03 /pmc/articles/PMC7913304/ /pubmed/33546240 http://dx.doi.org/10.3390/s21041032 Text en © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Wu, Zhijun
Guo, Junjun
Zhang, Chenlei
Li, Changliang
Steganography and Steganalysis in Voice over IP: A Review
title Steganography and Steganalysis in Voice over IP: A Review
title_full Steganography and Steganalysis in Voice over IP: A Review
title_fullStr Steganography and Steganalysis in Voice over IP: A Review
title_full_unstemmed Steganography and Steganalysis in Voice over IP: A Review
title_short Steganography and Steganalysis in Voice over IP: A Review
title_sort steganography and steganalysis in voice over ip: a review
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7913304/
https://www.ncbi.nlm.nih.gov/pubmed/33546240
http://dx.doi.org/10.3390/s21041032
work_keys_str_mv AT wuzhijun steganographyandsteganalysisinvoiceoveripareview
AT guojunjun steganographyandsteganalysisinvoiceoveripareview
AT zhangchenlei steganographyandsteganalysisinvoiceoveripareview
AT lichangliang steganographyandsteganalysisinvoiceoveripareview