z-logo
open-access-imgOpen Access
Covert communications through mobile voice channels
Author(s) -
Kazemi Reza,
Rezaei Roohollah,
Akhaee Mohammad A.,
Behnia Fereidoon
Publication year - 2016
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2014.0555
Subject(s) - information hiding , computer science , multiplicative function , covert channel , histogram , embedding , scheme (mathematics) , robustness (evolution) , block (permutation group theory) , digital watermarking , computer network , algorithm , theoretical computer science , mathematics , artificial intelligence , cloud computing , mathematical analysis , security information and event management , biochemistry , chemistry , image (mathematics) , gene , cloud computing security , operating system , geometry
The rapid development and growth of cellular mobile networks in recent years has made voice channels widely available almost everywhere. On the other hand, voice dedicated channels possess properties that make them ideal options for high priority real‐time secure communications. Beside these realities, information embedding has gained remarkable attention in recent years due to its potential application in multimedia security. In this regard, this study aims to propose an efficient scheme for data hiding to show the feasibility of exploiting these channels for covert communications. To this end, the authors propose new suboptimal but practical schemes based on additive and multiplicative spread spectrum methods. The analytical evaluations of the proposed techniques along with simulation results show proper efficiency of these schemes. Moreover, it is shown that the proposed scheme based on the M‐ary bi‐orthogonal general maximum likelihood and M‐ary bi‐orthogonal generalised embedding of multiplicative watermarks techniques outperform the other proposed schemes in this study. Experimental evaluation confirms that the proposed data hiding scheme benefits from an acceptable level of imperceptibility. Finally, the authors propose a security block which considerably increases the robustness of proposed structures against histogram‐based steganalysis.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here