期刊论文详细信息
Cybernetics and Information Technologies
Coverless VoIP Steganography Using Hash and Hash
Saravanan R.1  Deepikaa S.1 
[1] Vellore Institute of Technology, Vellore, India;
关键词: hash;    voip;   
DOI  :  10.2478/cait-2020-0031
来源: DOAJ
【 摘 要 】

Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover thereby improving the embedding transparency and becomes robust against the steganalysis attacks using coverless approach. Initially a hash array is built with the frame size. The cover bit position is identified from the hashing function. The hash array is marked with a flag value to indicate that the particular sample consist of the secret message bit. The hash array is attached with the VoIP samples, at the receiver side the hash table is separated, and the secret bits are extracted based on the hash array. The experimental results conducted on a VoIP prototype proved to be simpler and effective in terms of the computational complexity, undetectability and voice quality at both sender and receiver end.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次