• Register
  • Login
  • العربیة

Kerbala Journal for Engineering Sciences

  1. Home
  2. A Review and Comparison for Audio Steganography Techniques Based on Voice over Internet Protocol

Current Issue

By Issue

By Author

By Subject

Author Index

Keyword Index

Indexing and Abstracting

Related Links

FAQ

Journal Metrics

News

Publication fees

A Review and Comparison for Audio Steganography Techniques Based on Voice over Internet Protocol

    Authors

    • Baneen Qasem 1
    • Haider Shahadi 1
    • Muayad Kod 2
    • Hameed Farhan 1

    1 Electrical and Electronic Engineering, College of Engineering, University of Kerbala, Karbala, Iraq

    2 Electrical and Electronic Engineering, College of Engineering, University of Kerbala, Karbala Iraq

,

Document Type : Research Article

10.63463/kjes1027
  • Article Information
  • References
  • Download
  • How to cite
  • Statistics
  • Share

Abstract

Cryptography and steganography are the major role approaches for covert communications. While cryptography enciphers the information in such a way to be non-understandable for unauthorized persons, steganography conceals secure information in ordinary cover data without making perceptible variations in cover data to make data attackers in illusion and they consider the transmitted data is just ordinary data. Therefore, steganography is considered superior compared to cryptography because the encrypted attract the attention of the data attackers. However, it requires bandwidth or saving storage much greater than the hidden secure data. Steganography can be used in different modes such as offline and online, also it can be utilized with different data cover such as image, video, audio, text, and data frames. This study focuses on the most challenging mode in steganography, which is online (i.e. real-time steganography). In addition, it focuses on the most important kind of cover media, audio signals, which should be processed in real-time. Accordingly, this study presents a focused review on data hidden in the Voice over Internet Protocol (VoIP) network where VoIP represents the standard of real-time communication-based on delivery voice over Internet.  In addition to a brief survey for the existing real-time steganography approaches, this study also highlights the strengths and weaknesses of each approach. The rubric for assessing the approaches is based on some contradictory requirements for successful steganography approaches.  The most important requirements include data embedding rate, imperceptibility, security, robustness, and algorithm complexity which specify the effectiveness of any steganographic system. This study concludes that most of the existing approaches still lacked some features in one or more of the main requirements for real-time security-based steganography. 

Keywords

  • Audio steganography,,
  • ,،,؛real-time covert communication,,
  • ,،,؛Voice over Internet Protocol (VoIP),,
  • ,،,؛audio compression,,
  • ,،,؛VoIP standards Codecs
  • XML
  • PDF 587.1 K
  • RIS
  • EndNote
  • Mendeley
  • BibTeX
  • APA
  • MLA
  • HARVARD
  • VANCOUVER
References
H. I. Shahadi and R. Jidin, High capacity and inaudibility audio steganography scheme, Proc. 
2011 7th Int. Conf. Inf. Assur. Secur. IAS 2011, pp. 104–109, 2011. 
Zhijun W, Haijuan C, and Douzhe L, “An approach of steganography in G.729 bitstream based 
on matrix coding and interleaving,” Chinese J. Electron., vol. 24 no.1, pp. 157–165, 2015. 
R. Setiawan and T. Ahmad, “Improving the Capacity of Data Hiding by Modifying the 
Interpolation of Audio Samples,” 2020 8th Int. Conf. Inf. Commun. Technol. ICoICT 2020, 
pp. 7–12, 2020. 
C. Wang and Q. Wu, “Information hiding in real-time VoIP streams,” Proc. - 9th IEEE Int. 
Symp. Multimedia, ISM 2007, pp. 255–262, 2007. 
A. H. Ali, M. R. Mokhtar, and L. E. George, “Recent approaches for VoIP steganography,” 
Indian J. Sci. Technol., vol. 9, no. 38, 2016. 
N. Shetty, “Steganography for Secure Data Transmission,” Int. J. Comput. Intell. Res., vol. 
13, no. 10, pp. 2289–2295, 2017. 
Shahadi H I, Jidin R, and Way W H, “Lossless audio steganography based on lifting wavelet 
transform and dynamic stego key,” Indian J. Sci. Technol., vol. 7 (3), pp. 323–334, 2014. 
Jayaram, Ranganatha, and Anupama, “Information Hiding Using Audio Steganography - A 
Survey,” Int. J. Multimed. Its Appl., vol. 3, no. 3, pp. 86–96, 2011. 
A. Khan, A. Siddiqa, S. Munib, and S. A. Malik, “A recent survey of reversible watermarking 
techniques,” Inf. Sci. (Ny)., vol. 279, no. June 2019, pp. 251–272, 2014. 
[10] Shahad H I, Jidin R, and Way W H, “Concurrent hardware architecture for dual-mode audio 
steganography processor-based FPGA,” Comput. Electr. Eng., vol. 49, pp. 95–116, 2016.  
H. I. Shahadi and R. Jidin, High capacity and inaudibility audio steganography scheme, Proc. 
2011 7th Int. Conf. Inf. Assur. Secur. IAS 2011, pp. 104–109, 2011. 
Zhijun W, Haijuan C, and Douzhe L, “An approach of steganography in G.729 bitstream based 
on matrix coding and interleaving,” Chinese J. Electron., vol. 24 no.1, pp. 157–165, 2015. 
R. Setiawan and T. Ahmad, “Improving the Capacity of Data Hiding by Modifying the 
Interpolation of Audio Samples,” 2020 8th Int. Conf. Inf. Commun. Technol. ICoICT 2020, 
pp. 7–12, 2020. 
C. Wang and Q. Wu, “Information hiding in real-time VoIP streams,” Proc. - 9th IEEE Int. 
Symp. Multimedia, ISM 2007, pp. 255–262, 2007. 
A. H. Ali, M. R. Mokhtar, and L. E. George, “Recent approaches for VoIP steganography,” 
Indian J. Sci. Technol., vol. 9, no. 38, 2016. 
N. Shetty, “Steganography for Secure Data Transmission,” Int. J. Comput. Intell. Res., vol. 
13, no. 10, pp. 2289–2295, 2017. 
Shahadi H I, Jidin R, and Way W H, “Lossless audio steganography based on lifting wavelet 
transform and dynamic stego key,” Indian J. Sci. Technol., vol. 7 (3), pp. 323–334, 2014. 
Jayaram, Ranganatha, and Anupama, “Information Hiding Using Audio Steganography - A 
Survey,” Int. J. Multimed. Its Appl., vol. 3, no. 3, pp. 86–96, 2011. 
A. Khan, A. Siddiqa, S. Munib, and S. A. Malik, “A recent survey of reversible watermarking 
techniques,” Inf. Sci. (Ny)., vol. 279, no. June 2019, pp. 251–272, 2014. 
[10] Shahad H I, Jidin R, and Way W H, “Concurrent hardware architecture for dual-mode audio 
steganography processor-based FPGA,” Comput. Electr. Eng., vol. 49, pp. 95–116, 2016. 
[11] D. E. Skopin, I. M. M. El-Emary, R. J. Rasras, and R. S. Diab, “Advanced algorithms in audio 
steganography for hiding human speech signal,” Proc. - 2nd IEEE Int. Conf. Adv. Comput. 
Control. ICACC 2010, vol. 3, pp. 29–32, 2010. 
[12] S. Rekik, D. Guerchi, S. A. Selouani, and H. Hamam, “Speech steganography using wavelet 
and Fourier transforms,” Eurasip J. Audio, Speech, Music Process., vol. 2012, no. 1, pp. 1
14, 2012. 
[13] M. A. Ahmed, L. M. Kiah, B. B. Zaidan, and A. A. Zaidan, “A novel embedding method to 
increase capacity and robustness of low-bit encoding audio steganography technique using 
noise gate software logic algorithm,” Journal of Applied Sciences, vol. 10, no. 1. pp. 59–64, 
2010. 
[14] Tang S Y, Jiang Y J, Zhang L P, and Z. B. Zhou, “Audio steganography with AES for real
time covert voice over internet protocol communications,” Sci. China Inf. Sci., vol. 57, no. 3, 
pp. 1–14, 2014. 
[15] S. Deepikaa and R. Saravanan, “VoIP steganography methods, a survey,” Cybern. Inf. 
Technol., vol. 19, no. 1, pp. 73–87, 2019. 
[16] El-Khamy S E, Korany N O, and El-Sherif M H, “A security enhanced robust audio 
steganography algorithm for image hiding using sample comparison in discrete wavelet 
transform domain and RSA encryption,” Multimed. Tools Appl., vol. 76, no. 22, pp. 24091
24106, 2016. 
[17] Tan D, Lu Y, Yan X, and Wang X, “A simple review of audio steganography,” Proc. 2019 
IEEE 3rd Inf. Technol. Networking, Electron. Autom. Control Conf. ITNEC 2019, no. Itnec, 
pp. 1409–1413, 2019. 
[18] R. Roselinkiruba and R. Balakirshnan, “Secure steganography in audio using inactive frames 
of VoIP streams,” 2013 IEEE Conf. Inf. Commun. Technol. ICT 2013, no. Ict, pp. 491–495, 
2013. 
[19] Z. Wei, B. Zhao, B. Liu, J. Su, L. Xu, and E. Xu, “A novel steganography approach for voice 
over IP,” J. Ambient Intell. Humaniz. Comput., vol. 5, no. 4, pp. 601–610, 2014. 
[20] N. Tiwari, D. Madhu, and D. Meenu, “Spatial Domain Image Steganography based on 
Security and Randomization,” Int. J. Adv. Comput. Sci. Appl., vol. 5, no. 1, pp. 156–159, 
2014. 
[21] H. Shahadi and R. Jidin, “High Capacity and Resistance to Additive Noise Audio 
Steganography Algorithm,” IJCSI Int. J. Comput. Sci. Issues, vol. 8, no. 5, pp. 176–184, 2011. 
[22] S. Shirali-Shahreza and M. Shirali-Shahreza, “Steganography in silence intervals of speech,” 
Proc. - 2008 4th Int. Conf. Intell. Inf. Hiding Multimed. Signal Process. IIH-MSP 2008, pp. 
605–607, 2008. 
[23] M. H. N. Azam, F. Ridzuan, M. N. S. M. Sayuti, and A. A. Alsabhany, “Balancing the Trade
Off between Capacity and Imperceptibility for Least Significant Bit Audio Steganography 
Method: A New Parameter,” 2019 IEEE Conf. Appl. Inf. Netw. Secur. AINS 2019, pp. 48
53, 2019. 
[24] M. H. A. Al-Hooti, T. Ahmad, and S. Djanali, “Audio Data Hiding Using Octal Modulus 
Function Based Unsigned Integer Sample Values,” 2018 Int. Conf. Comput. Eng. Netw. Intell. 
Multimedia, CENIM 2018 - Proceeding, pp. 48–53, 2018. 
[25] A. H. Ali, L. E. George, A. A. Zaidan, and M. R. Mokhtar, “High capacity, transparent and 
secure audio steganography model based on fractal coding and chaotic map in temporal 
domain,” Multimed. Tools Appl., vol. 77, no. 23, pp. 31487–31516, 2018. 
[26] Z. Wu and W. Yang, “G . 711-Based Adaptive Speech Information Hiding,” pp. 1139–1144, 
2006. 
[27] N. Aoki, “A semi-lossless steganography technique for G.711 telephony speech,” Proc. Sixth 
Int. Conf. Intell. Inf. Hiding Multimed. Signal Process. Darmstadt, Ger., pp. 534–537, 2010. 
[28] A. H. Ali, M. R. Mokhtar, and L. E. George, “Enhancing the hiding capacity of audio 
steganography based on block mapping,” J. Theor. Appl. Inf. Technol., vol. 95, no. 7, pp. 
1441–1448, 2017. 
[29] Anjana K A, Satheesh C C, Kamal S, and Supriya M H, “Spread spectrum based encrypted 
audio steganographic system with improved security,” Proceeding Second Int. Conf. Circuits, 
Control. Commun. IEEE, pp. 109–114, 2017. 
[30] S. S. Bharti, M. Gupta, and S. Agarwal, “A novel approach for audio steganography by 
processing of amplitudes and signs of secret audio separately,” Multimed. Tools Appl., vol. 
78, no. 16, pp. 23179–23201, 2019. 
[31] S. Gupta and N. Dhanda, “Audio Steganography Using Discrete Wavelet Transformation 
(DWT) & Discrete Cosine Transformation (DCT),” IOSR J. Comput. Eng., vol. 17, no. 2, pp. 
2278–661, 2015. 
[32] S. Hemalatha, U. D. Acharya, and A. Renuka, “Wavelet transform based steganography 
technique to hide audio signals in image,” Procedia Comput. Sci., vol. 47, no. C, pp. 272–281, 
2015. 
[33] S. S. Verma, “A Novel Technique for Data Hiding in Audio Carrier by Using Sample 
Comparison in DWT Domain,” pp. 0–4, 2014. 
[34] H. I. Shahadi, M. S. Kod, B. Qasem, and R. Hameed, “Real-Time Scheme for Covert 
Communication Based VoIP Real-Time Scheme for Covert Communication Based VoIP,”
2021. 
[35] Z. Wu, J. Guo, C. Zhang, and C. Li, “Steganography and steganalysis in voice over ip: A 
review,” Sensors (Switzerland), vol. 21, no. 4, pp. 1–31, 2021. 
[36] W. Mazurczyk, “VoIP steganography and its detection-a survey,” ACM Comput. Surv., vol. 
46, no. 2, 2013. 
[37] F. M. Guo, A. Talevski, and E. Chang, “Voice over Internet protocol on mobile devices,” Proc. - 6th IEEE/ACIS Int. Conf. Comput. Inf. Sci. ICIS 2007; 1st IEEE/ACIS Int. Work. e-Activity, 
IWEA 2007, no. Icis, pp. 163–168, 2007. 
[38] G. S. Miliefsky, “Securing Voice Over Internet Protocol (VoIP),” Hakin9 Pract. Prot., vol. 90, 
no. 9, p. 51, 2010. 
[39] M. DeSantis, “Understanding Voice over Internet Protocol ( VoIP ),” US Cert, pp. 1–5, 2008. 
[40] Shirali-Shahreza M H and Shirali-Shahreza S, “Real-time and MPEG-1 layer III compression 
resistant steganography in speech,” IET Inf. Secur., vol. 4, no. 1, pp. 1–7, 2010. 
[41] P. M. Kumar and K. Srinivas, “Real Time Implementation of Speech Steganography,” Proc. 
2nd Int. Conf. Smart Syst. Inven. Technol. ICSSIT 2019, vol. 23, no. 1, pp. 365–369, 2019. 
[42] H. I. Shahadi, R. Jidin, and W. H. Way, “A novel and high capacity audio steganography 
algorithm based on adaptive data embedding positions,” Res. J. Appl. Sci. Eng. Technol., vol. 
7, no. 11, pp. 2311–2323, 2014. 
[43] B. Datta and S. Tat, “Robust High Capacity Audio Steganography using Modulo Operator,” 
2015 IEEE, 2015. 
[44] S. E. El-Khamy, N. O. Korany, and M. H. El-Sherif, “Robust image hiding in audio based on 
integer wavelet transform and Chaotic maps hopping,” Natl. Radio Sci. Conf. NRSC, Proc., 
no. Nrsc, pp. 205–212, 2017. 
[45] H. Tian, K. Zhou, H. Jiang, J. Liu, Y. Huang, and D. Feng, “An M-sequence based 
steganography model for voice over IP,” IEEE Int. Conf. Commun., 2009. 
[46] H. Tian, K. Zhou, H. Jiang, Y. Huang, J. Liu, and D. Feng, “An adaptive steganography 
scheme for voice over IP,” Proc. - IEEE Int. Symp. Circuits Syst., pp. 2922–2925, 2009. 
[47] H. Tian, H. Jiang, K. Zhou, and D. Feng, “Adaptive partial-matching steganography for voice 
over IP using triple M sequences,” Comput. Commun., vol. 34, no. 18, pp. 2236–2247, 2011. 
[48] Y. Jiang and S. Tang, “An efficient and secure VoIP communication system with chaotic 
mapping and message digest,” Multimed. Syst., vol. 24, no. 3, pp. 355–363, 2018. 
[49] R. S. Lin, “A synchronization scheme for hiding information in encoded bitstream of inactive 
speech signal,” J. Inf. Hiding Multimed. Signal Process., vol. 7, no. 5, pp. 916–929, 2016. 
[50] F. Li, B. Li, L. Peng, W. Chen, L. Zheng, and K. Xu, A Steganographic Method Based on High Bit Rates Speech Codec of G.723.1, vol. 11068 LNCS. 2018.
    • Article View: 3,282
    • PDF Download: 729
Kerbala Journal for Engineering Sciences
Volume 1, Issue 2
December 2021
Pages 153-169
Files
  • XML
  • PDF 587.1 K
Share
How to cite
  • RIS
  • EndNote
  • Mendeley
  • BibTeX
  • APA
  • MLA
  • HARVARD
  • VANCOUVER
Statistics
  • Article View: 3,282
  • PDF Download: 729

APA

Qasem, B., Shahadi, H., Kod, M., & Farhan, H. (2021). A Review and Comparison for Audio Steganography Techniques Based on Voice over Internet Protocol. Kerbala Journal for Engineering Sciences, 1(2), 153-169. doi: 10.63463/kjes1027

MLA

Baneen Qasem; Haider Shahadi; Muayad Kod; Hameed Farhan. "A Review and Comparison for Audio Steganography Techniques Based on Voice over Internet Protocol". Kerbala Journal for Engineering Sciences, 1, 2, 2021, 153-169. doi: 10.63463/kjes1027

HARVARD

Qasem, B., Shahadi, H., Kod, M., Farhan, H. (2021). 'A Review and Comparison for Audio Steganography Techniques Based on Voice over Internet Protocol', Kerbala Journal for Engineering Sciences, 1(2), pp. 153-169. doi: 10.63463/kjes1027

VANCOUVER

Qasem, B., Shahadi, H., Kod, M., Farhan, H. A Review and Comparison for Audio Steganography Techniques Based on Voice over Internet Protocol. Kerbala Journal for Engineering Sciences, 2021; 1(2): 153-169. doi: 10.63463/kjes1027

  • Home
  • About Journal
  • Editorial Board
  • Submit Manuscript
  • Contact Us
  • Glossary
  • Sitemap

News

  • Free publication for International researchers and ... 2025-04-04
  • Guidelines for Paper Submission in KJES 2021-11-08
  • Submit your paper 2021-05-27
  • The first issue has been published in Sept 2020. 2020-09-27

Newsletter Subscription

Subscribe to the journal newsletter and receive the latest news and updates

© Journal Management System. Powered by iJournalPro.com