By Topic

Network based intrusion detection to detect steganographic communication channels: on the example of audio data

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
J. Dittmann ; AMSL Adv. Multimedia & Security Lab., Otto-van-Guericke Univ., Magdeburg, Germany ; D. Hesse

Due to the nature of multimedia data exchange over the Internet between authorized users, one of the most difficult tasks is to control unauthorized information flow. With respect to confidentiality requirements and breaches in security, steganography offers an instrument for attackers to hide a communication by embedding the secret message into an innocuous communication channel, the so-called cover data. Due to the improvements of audio steganography, disclosure of information becomes possible for a lot of applications. In our paper we investigate voice-over-IP applications and intrusion detection systems (IDS) to detect hidden communication channels. Besides an general application scenario and performance of audio capturing, we introduce two steganalysis classifier for speech: one for MP3Stego and one for Steghide. Our first tests are based on an offline analysis of captured speech data.

Published in:

Multimedia Signal Processing, 2004 IEEE 6th Workshop on

Date of Conference:

29 Sept.-1 Oct. 2004