Back close

A Model for the Effective Steganalysis of VoIP

Publication Type : Book Chapter

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

Source : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 379-387). Springer India.

Campus : Coimbatore

School : School of Engineering, Centre for Cybersecurity Systems and Networks

Center : TIFAC CORE in Cyber Security

Department : cyber Security

Year : 2015

Abstract : The latest studies and applications in steganography are based on Internet, particularly voice over IP (VoIP). VoIP has proved itself to be a perfect carrier for hidden data. Most of the approaches for VoIP steganalysis focus on detecting hidden data in the payload of the packets, by extending audio steganalysis methods. Here, we propose an effective steganalysis method which considers the speech behavior as well as network protocol structure to detect hidden communication. The common statistical features, like mean, covariance, etc., are also considered for effective classification.

Admissions Apply Now