Abstract

Steganography is a technique that makes it possible to hide additional information (payload) in the original signal (cover work). This paper focuses on hiding information in a speech signal. One of the major problems with steganographic systems is ensuring synchronization. The paper presents four new and effective mechanisms that allow achievement of synchronization on the receiving side. Three of the developed methods of synchronization operate directly on the acoustic signal, while the fourth method works in the higher layer, analyzing the structure of the decoded steganographic data stream. The results of the research concerning both the evaluation of signal quality and the effectiveness of synchronization are presented. The signal quality was assessed based on both objective and subjective methods. The conducted research confirmed the effectiveness of the developed methods of synchronization during the transmission of steganographic data in the VHF radio link and in the VoIP channel.

Highlights

  • Introduction for Steganographic TransmissionThe paper is devoted to the issues of acoustic steganography, and more precisely hidden synchronization of acoustic steganographic channels

  • In the case of practical implementations of steganographic systems, this approach is too much of a simplification, because achieving synchronization is a necessary condition for the effective extraction of payload [1,2]

  • Machine learning algorithms can help increase the effectiveness of acoustic synchronization mechanisms

Read more

Summary

Related Work

There are many published papers dealing with acoustic steganography. For the purposes of this paper, many solutions have been analyzed. Instead of embedding the information in the phase of the original signal, the authors proposed to embed an OFDM signal in the original signal and encode the payload by changing the phase angle of these additional harmonics This method is characterized by a data rate of about 40 bit/s and is resistant to degradation factors occurring in real VHF radio links or during speech signal transmission in GSM cellular lines. The papers [38,39,40] present the results confirming the use of the echo signal to create covert channels These methods confirm effective data extraction in the presence of many signal distorting factors, such as adding noise, changing the sampling frequency, filtering, lossy compression, and transmission over a VoIP link. The Google Scholar search engine finds 4270 items

Embedding and Extraction Algorithm
Technique
Monotonic Phase Correction
Cumulative
Direct
10. The block block diagram diagram of of the the DSS
13. Signal
Minimal
Minimal Error Synchronization
Signal Quality Assessment
Figures This
HiddenTransmission
Steganographic Transmission on the VHF Radio Link
Steganographic
Increasing
Conclusions
Background
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.