用户名: 密码: 验证码:
基于流媒体的网络隐信道研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
基于流媒体的网络隐信道研究吸引了越来越多学者的关注,作为一种“多通道”载体,流媒体具有瞬时性和不可预测性,以它作为载体构建隐信道进行隐蔽通信,具有其他媒介无法比拟的优势。目前为止,流媒体隐信道在构建算法研究方面已经有不少研究成果,与正向研究相比,其逆向检测研究仍然处于起步阶段,有效的检测算法很少。现有的流媒体隐信道大多局限在G711, G.723.1, G.729a等互联网VoIP编码流中,而随着3G移动网络的迅速发展,基于移动流媒体的隐信道研究必将是未来隐信道的发展趋势。除此以外,流媒体隐信道在系统设计研究和应用研究方面也远远不足。
     针对目前流媒体隐信道的研究现状,本文从逆向检测研究、正向构建算法研究、系统设计与实现以及应用研究这四个方面展开工作。
     在逆向检测研究方面,本文设计了两种高效的盲检测算法。第一种是基于马尔科夫状态转移的检测方法,利用多维马尔科夫链对流媒体参数进行建模分析,并将马尔科夫状态转移矩阵作为分类特征矢量。第二种是基于信源熵率的检测方法,该方法使用马尔科夫信源模型对流媒体参数进行统计分析,将马尔科夫信源极限熵作为分类特征值。实验结果表明,这两种方法在检测准确率和检测窗口尺寸方面都要优于现有算法,大大提高了在线检测的能力。
     在正向研究方面,本文首先提出了基于次优编码的自适应隐信道算法。该方法利用代数码本搜索的冗余性来设计隐写嵌入算法,并引入自适应参数,在变速率编码过程中自动调节嵌入率,使隐写后得到的语音始终保持良好的听觉效果。该方法构建的隐信道带宽最高可达3.2kbpso实验表明,基于次优编码的隐写算法不会给编码器带来额外的计算复杂度,具有良好的不可感知性(语音质量高)和较强的抗检测性,现有的检测算法无法进行有效检测。此外,本文还提出了一种基于码率伪装的高速率隐信道算法,该方法利用流媒体变速率编码器的多码率冗余性设计隐写嵌入算法,它将隐蔽信息填充在低码率编码器语音帧尾部,伪装成高码率的编码器语音帧,并采用SRTP协议加密语音帧保证其安全性。该方法构建的隐信道带宽达到5.6kbps,实验表明该方法在隐藏容量和安全性方面都有较强的实用性。
     在系统设计与实现研究方面,本文基于正向研究的成果,设计并实现了3G手机上的隐信道系统软件—Stegdroid,该系统引入半可靠的传输控制机制,支持任意形式的数据传输,Stegdroid可以构建单双工隐信道,传输带宽为3.2kbps-5.6kbps。测试结果表明Stegdroid运行稳定,可以在3G、4G和Wifi等网络中使用,具有实际应用意义。
     在应用研究方面,本文提出使用隐信道来节省流媒体的传输带宽。论文以AMR-WB为例,详细介绍了隐信道降低流媒体传输带宽的基本原理和工作流程,实验结果表明该方法可以为AMR-WB节省10.7%-15.1%(1.6kbps-2.55kbps)的带宽,且基本不会降低AMR-WB的语音质量。该方法有效节约了网络带宽资源,减轻流媒体网络负载。虽然论文只是以AMR-WB为例进行介绍,但基于隐信道降低传输带宽的思想也可以应用到其他流媒体中,其基本原理是一样的。
Research on covert channel based on streaming media has been attracting more and more people's attention. As a "multi-channel" carrier, streaming media is instantaneous and unpredictable. Using it to build covert channel for covert communication has incomparable advantages than others. So far, research on methods of building covert channel based on streaming media have had a number of research results. Compared with the forward studies, the study of reverse detection is still in its infancy, and has little effective detection algorithms. Most of the existing covert channels based on streaming media are limited to the compressed streaming of Internet VoIP such as G.711, G.723.1, G729a. But with the rapid development of3G mobile networks, research on mobile streaming based covert channel must be a trend in the future. In addition, system design and application of covert streaming channels are also far from enough.
     In view of the current research of covert channel based on streaming media, this article works in the four areas of reverse detection, building algorithms, system design and implementation, as well as application.
     In the reverse detection research, we design two efficient blind detection algorithm. The first detection method is based on Markov state transition, using Markov chain to model and analyse the parameters of streaming, and employing Markov state transition matrix as the classification feature vector. The second detection method is based on the rate of entropy. The method analyses the parameters of streaming media by using Markov source model. It employes the entropy rate of Markov source as the classification feature. Experimental results show that the two methods are superior to the existing algorithms in the aspects of detection accuracy and the size of detection window, and greatly improve the ability of detecting online.
     In the forward research, this paper proposes an adaptive covert channel scheme based on suboptimal coding. The method designs the steganographic embedding algorithm by making use of the redundancy of the fixed codebook search process, and introduces an adaptive parameter, to adjust the embedding rate during the switch of coding bit rate, for always keeping good speech qualities. The bandwidth of the covert channel built by the method is up to3.2kbps. Experiments show that the steganography based on suboptimal coding, brings no additional computational complexity to the encoder, and has good imperceptibility (in term of high speech quality) and strong anti-detection property. The existing detection algorithms are useless for the method. In addition, the paper also presents a high rate covert channel based on rate camouflage. It fills the covert messages into the tail of the speech frame of a low bit rate coder, disguised as a speech frame of a high rate coder, and uses SRTP protocol to encrypt the frame for safety. The bandwidth of the covert channel built by the method is up to5.6kbps. Experiments show that the method has the strong usability in terms of hidden capacity and safety.
     In the system design and implementation research, based on the positive results of the forward research, the paper design and implement a covert channel system on3G phone-Stegdroid. The system introduces semi-reliable transmission control mechanism and supports any form of data transmission. Stegdroid can build single and duplex covert channels, with a bandwidth among3.2kbps~5.6kbps. Test results show Stegdroid is stable, and can be used in3G,4G and wifi networks, which has a strong usability.
     In application research, we propose to use covert channel to save transmission bandwidth of streaming media. Taking the AMR-WB for example, the paper details the basic principles and workflow of using covert channel to reduce the transmission bandwidth of streaming media. The experimental results show that this method can contribute to10.7%~15.1%(1.6kbps~2.55kbps) bandwidth reduction for AMR-WB, with little degradation of the speech quality. This method can effectively save network bandwidth resources, reducing the load of streaming media network. Although the method is only applied to AMR-WB as an example in this article, the idea can be be further applied in any other streaming media and the basic principle is the same.
引文
[1]R. Anderson, Information hiding:first international workshop, Cambridge, UK, May 30-June 1,1996:proceedings (New York, NY, USA,1996), vol.1174 of Lecture Notes in Computer Science,1996.
    [2]Kahn D. The history of steganography[C]//Information Hiding. Springer Berlin Heidelberg, 1996:1-5.
    [3]Anderson R J, Petitcolas F A P. On the limits of steganography[J]. Selected Areas in Communications, IEEE Journal on,1998,16(4):474-481.
    [4]Nikolaidis N, Pitas I. Robust image watermarking in the spatial domain[J], Signal processing, 1998,66(3):385-403.
    [5]Swanson M D, Kobayashi M, Tewfik A H. Multimedia data-embedding and watermarking technologies[J]. Proceedings of the IEEE,1998,86(6):1064-1087.
    [6]Marvel L M, et al. Spread spectrum image steganography[J]. Image Processing, IEEE Transactions on,1999,8(8):1075-1083.
    [7]Niu X X, Yang Y X. Research on the algorithm of text steganography [J]. ACTA Electronica Sinica,2003,31(3):402-405.
    [8]Xu J, Sung A H, Shi P, et al. Text Steganography using Wavelet Transform[C]//Proc. of 7th LASTED International Conference on Internet and Multimedia Systems and Applications. 2003:473-478.
    [9]Topkara M, Taskiran C M, Delp III E J. Natural language watermarking[C]//Electronic Imaging 2005. International Society for Optics and Photonics,2005:441-452.
    [10]Chang C Y, Clark S. Linguistic steganography using automatically generated paraphrases[C]//Human Language Technologies:The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. Association for Computational Linguistics,2010:591-599.
    [11]Rhoads G B. Audio steganography:U.S. Patent 6,330,335[P].2001-12-11.
    [12]Gopalan K. Audio steganography using bit modification[C]//Multimedia and Expo,2003. ICME'03. Proceedings.2003 International Conference on. IEEE,2003,1:1-629-32 vol.1.
    [13]Cvejic N, Seppanen T. Increasing the capacity of LSB-based audio steganography[C]//Multimedia Signal Processing,2002 IEEE Workshop on. IEEE,2002: 336-338.
    [14]Westfeld A, Wolf G. Steganography in a video conferencing system[C]//Information Hiding. Springer Berlin Heidelberg,1998:32-47.
    [15]Robie D L, Mersereau R M. Video error correction using steganography[J]. EURASIP Journal on Advances in Signal Processing,1900,2002(2):164-173.
    [16]Budhia U, Kundur D, Zourntos T. Digital video steganalysis exploiting statistical visibility in the temporal domain[J]. Information Forensics and Security, IEEE Transactions on,2006, 1(4):502-516.
    [17]Socek D, Kalva H, Magliveras S S, et al. New approaches to encryption and steganography for digital videos[J]. Multimedia Systems,2007,13(3):191-204.
    [18]Lampson B W. A note on the confinement problem[J]. Communications of the ACM,1973, 16(10):613-615.
    [19]Simmons G J. The prisoners'problem and the subliminal channel[C]//Advances in Cryptology. Springer US,1984:51-67.
    [20]Girling C G. Covert Channels in LAN's[J]. IEEE Transactions on Software Engineering, 1987 (2):292-296.
    [21]Wolf M. Covert channels in LAN protocols[M]//Local Area Network Security. Springer Berlin Heidelberg,1989:89-101.
    [22]Handel T G, Sandford II M T. Hiding data in the OSI network model[C]//Information Hiding. Springer Berlin Heidelberg,1996:23-38.
    [23]Rowland C H. Covert channels in the TCP/IP protocol suite[J]. First Monday,1997,2(5).
    [24]Hintz A. Covert channels in TCP and IP headers[J]. Presentation at DEFCON,2002,10.
    [25]Kundur D, Ahsan K. Practical Internet steganography:data hiding in IP[C]//Proceedings of the Texas workshop on security of information systems.2003,2.
    [26]Fisk G, Fisk M, Papadopoulos C, et al. Eliminating steganography in Internet traffic with active wardens[C]//Information Hiding. Springer Berlin Heidelberg,2003:18-35.
    [27]Lucena N B, Lewandowski G, Chapin S J. Covert channels in IPv6[C]//Privacy Enhancing Technologies. Springer Berlin Heidelberg,2006:147-166.
    [28]Ahsan K, Kundur D. Practical data hiding in TCP/IP[C]//Proc. ACM Workshop on Multimedia Security. Dec.2002.
    [29]Cauich E, Cardenas R G, Watanabe R. Data hiding in identification and offset IP fields[M]//Advanced Distributed Systems. Springer Berlin Heidelberg,2005:118-125.
    [30]Danezis G. Covert communications despite traffic data retention[M]//Security Protocols XVI. Springer Berlin Heidelberg,2011:198-214.
    [31]Qu H, Su P, Feng D. A typical noisy covert channel in the IP protocol[C]//Security Technology,2004.38th Annual 2004 International Carnahan Conference on. IEEE,2004: 189-192.
    [32]Zander S, Armitage G, Branch P. Covert channels in the IP time to live field[C]//Proceedings of Australian Telecommunication Networks and Applications Conference (ATNAC).2006.
    [33]眭新光,朱中梁.基于IP包的信息隐藏技术[J].计算机工程,2008,34(15):142-143.
    [34]Murdoch S J, Lewis S. Embedding covert channels into TCP/IP[C]//Information Hiding. Springer Berlin Heidelberg,2005:247-261.
    [35]Cabuk S, Brodley C E, Shields C. IP covert timing channels:design and detection[C]//Proceedings of the 11th ACM conference on Computer and communications security. ACM,2004:178-187.
    [36]Shah G, Molina A, Blaze M. Keyboards and covert channels[C]//Proceedings of the 15th conference on USENIX Security Symposium.2006,15:5.
    [37]Gianvecchio S, Wang H, Wijesekera D, et al. Model-based covert timing channels: Automated modeling and evasion[C]//Recent Advances in Intrusion Detection. Springer Berlin Heidelberg,2008:211-230.
    [38]Luo X, Chan E W W, Chang R K C. TCP covert timing channels:Design and detection[C]//Dependable Systems and Networks With FTCS and DCC,2008. DSN 2008. IEEE International Conference on. IEEE,2008:420-429.
    [39]Bai L Y, Huang Y, Hou G, et al. Covert channels based on jitter field of the RTCP header[C]//Intelligent Information Hiding and Multimedia Signal Processing,2008. IIHMSP'08 International Conference on. IEEE,2008:1388-1391.
    [40]Sellke S H, Wang C C, Bagchi S, et al. TCP/IP timing channels:Theory to implementation[C]//INFOCOM 2009, IEEE. IEEE,2009:2204-2212.
    [41]Lizhi Y, Yongfeng H, Jian Y, et al. A Novel Covert Timing Channel Based on RTP/RTCP[J]. Chinese Journal of Electronics,2012,21(4):711-714.
    [42]Bialczak P, Mazurczyk W, Szczypiorski K. Sending hidden data via google suggest[J]. arXiv preprint arXiv:1107.4062,2011.
    [43]Zander S, Armitage G, Branch P. Covert channels in multiplayer first person shooter online games[C]//Local Computer Networks,2008. LCN 2008.33rd IEEE Conference on. IEEE, 2008:215-222.
    [44]Zander S, Armitage G, Branch P. Reliable transmission over covert channels in first person shooter multiplayer games[C]//Local Computer Networks,2009. LCN 2009. IEEE 34th Conference on. IEEE,2009:169-176.
    [45]Kratzer C, Dittmann J, Vogel T, et al. Design and Evaluation of Steganography for Voice-over-IP[C]//Circuits and Systems,2006. ISCAS 2006. Proceedings.2006 IEEE International Symposium on. IEEE,2006:4 pp.
    [46]Komaki N, YAMAMOTO T. A packet loss concealment technique for VoIP using steganography[J]. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences,2003,86(8):2069-2072.
    [47]Mazurczyk W, Kotulski Z. Covert channel for improving VoIP security[M]//Advances in Information Processing and Protection. Springer US,2008:271-280.
    [48]Mazurczyk W, Szczypiorski K. Covert Channels in SIP for VoIP signalling[M]//Global E-Security. Springer Berlin Heidelberg,2008:65-72.
    [49]互联网协会2012全球互联网用户调查报告http://www.36kr.com/p/176041.html
    [50]国家新闻出版广电总局发展研究中心.中国视听新媒体发展报告(2013).北京:社会科学文献出版社.
    [51]Aoki N. Potential of value-added speech communications by using steganography[C]//Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)-Volume 02. IEEE Computer Society,2007:251-254.
    [52]SUZUKI Y. Information hiding for G.711 speech based on substitution of least significant bits and estimation of tolerable distortion[J]. IEICE transactions on fundamentals of electronics, communications and computer sciences,2010,93(7):1279-1286.
    [53]Tian H, Zhou K, Jiang H, et al. An adaptive steganography scheme for voice over IP[C]//Circuits and Systems,2009. ISCAS 2009. IEEE International Symposium on. IEEE, 2009:2922-2925.
    [54]Miao R, Huang Y. An approach of covert communication based on the adaptive steganography scheme on Voice over IP[C]//Communications (ICC),2011 IEEE International Conference on. IEEE,2011:1-5.
    [55]Liu J, Zhou K, Tian H. Least-significant-digit steganography in low bitrate speech[C]//Communications (ICC),2012 IEEE International Conference on. IEEE,2012: 1133-1137.
    [56]Huang Y F, Tang S, Yuan J. Steganography in inactive frames of VoIP streams encoded by source codec[J]. Information Forensics and Security, IEEE Transactions on,2011,6(2): 296-306.
    [57]Dittmann J, Hesse D, Hillert R. Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set[C]//Electronic Imaging 2005. International Society for Optics and Photonics,2005:607-618.
    [58]Wu Z, Yang W. G.711-based adaptive speech information hiding approach[M]//Intelligent Computing. Springer Berlin Heidelberg,2006:1139-1144.
    [59]Takahashi T, Lee W. An assessment of VoIP covert channel threats[C]//Security and Privacy in Communications Networks and the Workshops,2007. SecureComm 2007. Third International Conference on. IEEE,2007:371-380.
    [60]Wang C, Wu Q. Information hiding in real-time VoIP streams[C]//Multimedia,2007. ISM 2007. Ninth IEEE International Symposium on. IEEE,2007:255-262.
    [61]Huang Y, Xiao B, Xiao H. Implementation of covert communication based on steganography[C]//Intelligent Information Hiding and Multimedia Signal Processing,2008. IIHMSP'08 International Conference on. IEEE,2008:1512-1515.
    [62]Liu L, Li M, Li Q, et al. Perceptually transparent information hiding in G.729 bitstream[C]//2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2008:406-409.
    [63]Tian H, Zhou K, Huang Y, et al. A covert communication model based on least significant bits steganography in voice over ip[C]//Young Computer Scientists,2008. ICYCS 2008. The 9th International Conference for. IEEE,2008:647-652.
    [64]Tian H, Zhou K, Jiang H, et al. An M-sequence based steganography model for voice over IP[C]//Communications,2009. ICC'09. IEEE International Conference on. IEEE,2009:1-5.
    [65]Xu T, Yang Z. Simple and effective speech steganography in G.723.1 low-rate codes[C]//2009 International Conference on Wireless Communications&Signal Processing. 2009:1-4.
    [66]Xu E, Liu B, Xu L, et al. Adaptive VoIP steganography for information hiding within network audio streams[C]//Network-Based Information Systems (NBiS),2011 14th International Conference on. IEEE,2011:612-617.
    [67]Tian H, Jiang H, Zhou K, et al. Transparency-orientated encoding strategies for voice-over-IP steganography [J]. The Computer Journal,2012,55(6):702-716.
    [68]Wu Z, Yang W, Yang Y. ABS-based speech information hiding approach[J]. Electronics Letters,2003,39(22):1617-1619.
    [69]Wu Z, Yang W. Speech information hiding in G.729[J]. Chinese Journal of Electronics, 2006,15(3):545.
    [70]Wu Z J, Gao W, Yang W. LPC parameters substitution for speech information hiding[J]. The Journal of China Universities of Posts and Telecommunications,2009,16(6):103-112.
    [71]Zhe-Ming L, Bin Y, Sheng-He S. Watermarking combined with CELP speech coding for authentication [J]. IEICE Transactions on Information and systems,2005,88(2):330-334.
    [72]Geiser B, Vary P. Backwards compatible wideband telephony in mobile networks:CELP watermarking and bandwidth extension[C]//Acoustics, Speech and Signal Processing,2007. ICASSP 2007. IEEE International Conference on. IEEE,2007,4:IV-533-IV-536.
    [73]Geiser B, Vary P. High rate data hiding in ACELP speech codecs[C]//Acoustics, Speech and Signal Processing,2008. ICASSP 2008. IEEE International Conference on. IEEE,2008: 4005-4008.
    [74]Xiao B, Huang Y, Tang S. An approach to information hiding in low bit-rate speech stream[C]//Global Telecommunications Conference,2008. IEEE GLOBECOM 2008. IEEE. IEEE,2008:1-5.
    [75]Nishimura A. Data hiding in pitch delay data of the adaptive multi-rate narrow-band speech codec[C]//Intelligent Information Hiding and Multimedia Signal Processing,2009. IIH-MSP'09. Fifth International Conference on. IEEE,2009:483-486.
    [76]Liu J X, Lu Z M, Luo H. A CELP-speech information hiding algorithm based on vector quantization[C]//Information Assurance and Security,2009. IAS'09. Fifth International Conference on. IEEE,2009,2:75-78.
    [77]Huang Y, Liu C, Tang S, et al. Steganography Integration Into a Low-Bit Rate Speech Codec[J]. Information Forensics and Security, IEEE Transactions on,2012,7(6): 1865-1875.
    [78]Bai L Y, Huang Y, Hou G, et al. Covert channels based on jitter field of the RTCP header[C]//Intelligent Information Hiding and Multimedia Signal Processing,2008. IIHMSP'08 International Conference on. IEEE,2008:1388-1391.
    [79]Wang X, Chen S, Jajodia S. Tracking anonymous peer-to-peer VoIP calls on the internet [C]//Proceedings of the 12th ACM conference on Computer and communications security. ACM,2005:81-91.
    [80]Mazurczyk W, Kotulski Z. New security and control protocol for VoIP based on steganography and digital watermarking[J]. arXiv preprint cs/0602042,2006.
    [81]Shah G, Blaze M. Covert channels through external interference[C]//Proceedings of the 3rd USENIX conference on Offensive technologies. USENIX Association,2009:3-3.
    [82]Huang Y, Yuan J, Chen M, et al. Key distribution over the covert communication based on VoIP[J]. Chinese Journal of Electronics,2011,20(2):357-360.
    [83]Lloyd, P.2010. An exploration of covert channels within Voice over IP. Master's thesis. Rochester Institute of Technology, https://ritdml.rit.edu/bitstream/handle/1850/12241/PLloydThesis5-4-2010.pdf?sequen ce=1.
    [84]Mazurczyk W, Szczypiorski K. Steganography of VoIP streams[M]//On the Move to Meaningful Internet Systems:OTM 2008. Springer Berlin Heidelberg,2008:1001-1018.
    [85]Forbes C R. A new covert channel over RTP[D]. Rochester Institute of Technology,2009.
    [86]Wieser C, Roning J. An evaluation of VoIP covert channels in an SBC setting[J]. SECURITY IN FUTURES-SECURITY IN CHANGE,2011:54.
    [87]Hamdaqa M, Tahvildari L. ReLACK:A reliable VoIP steganography approach[C]//Secure Software Integration and Reliability Improvement (SSIRI),2011 Fifth International Conference on. IEEE,2011:189-197.
    [88]Tian H, Guo R, Lu J, et al. Implementing Covert Communication over Voice Conversations with Windows Live Messenger[J]. Advances in Information Sciences & Service Sciences, 2012,4(4).
    [89]Mazurczyk W, Lubacz J. LACK-a VoIP steganographic method[J]. Telecommunication Systems,2010,45(2-3):153-163.
    [90]Mazurczyk W, Szaga P, Szczypiorski K.. Using transcoding for hidden communication in IP telephony[J]. Multimedia Tools and Applications,2012:1-27.
    [91]Sohn T, Seo J T, Moon J. A study on the covert channel detection of TCP/IP header using support vector machine[M]//Information and Communications Security. Springer Berlin Heidelberg,2003:313-324.
    [92]Tumoian E, Anikeev M. Detecting NUSHU covert channels using neural networks[J]. 2005-05-18). http://www.ouah.org/neural_networks_vs_ NUSHU.pdf,2005.
    [93]Berk V, Giani A, Cybenko G. Covert channel detection using process query systems[J]. Proceedings of FLOCON 2005,2005.
    [94]Berk V, Giani A, Cybenko G. Detection of covert channel encoding in network packet delays[J]. Rapport technique TR536, de lUniversite de Dartmouth. Novembre,2005.
    [95]Gianvecchio S, Wang H. Detecting covert timing channels:an entropy-based approach[C]//Proceedings of the 14th ACM conference on Computer and communications security. ACM,2007:307-316.
    [96]Gianvecchio S, Wang H. An entropy-based approach to detecting covert timing channels[J]. Dependable and Secure Computing, IEEE Transactions on,2011,8(6):785-797.
    [97]Ozer H, Avcibas I, Sankur B, et al. Steganalysis of audio based on audio quality metrics[C]//Electronic Imaging 2003. International Society for Optics and Photonics,2003: 55-66.
    [98]Paraskevas I, Chilton E. Combination of magnitude and phase statistical features for audio classification[J]. Acoustics Research Letters Online,2004,5(3):111-117.
    [99]Johnson M K, Lyu S, Farid H. Steganalysis of recorded speech[C]//Electronic Imaging 2005. International Society for Optics and Photonics,2005:664-672.
    [100]Holotyak T, Fridrich J, Voloshynovskiy S. Blind statistical steganalysis of additive steganography using wavelet higher order statistics[C]//Communications and Multimedia Security.2005,3677:273-274.
    [101]Avcibas I. Audio steganalysis with content-independent distortion measures[J]. IEEE Signal Processing Letters,2006,13(2).
    [102]Zeng W, Ai H, Hu R. A novel steganalysis algorithm of phase coding in audio signal[C]//Advanced Language Processing and Web Information Technology,2007. ALPIT 2007. Sixth International Conference on. IEEE,2007:261-264.
    [103]Kraetzer C, Dittmann J. Pros and cons of mel-cepstrum based audio steganalysis using SVM classification[C]//Information Hiding. Springer Berlin Heidelberg,2007:359-377.
    [104]Zeng W, Ai H, Hu R. An algorithm of echo steganalysis based on power cepstrum and pattern classification[C]//Audio, Language and Image Processing,2008. ICALIP 2008. International Conference on. IEEE,2008:1344-1348.
    [105]Liu Y, Chiang K, Corbett C, et al. A novel audio steganalysis based on high-order statistics of a distortion measure with hausdorff distance[M]//Information Security. Springer Berlin Heidelberg,2008:487-501.
    [106]Liu Q, Sung A H, Qiao M. Spectrum steganalysis of wav audio streams[M]//Machine Learning and Data Mining in Pattern Recognition. Springer Berlin Heidelberg,2009: 582-593.
    [107]Liu Q, Sung A H, Qiao M. Novel stream mining for audio steganalysis[C]//Proceedings of the 17th ACM international conference on Multimedia. ACM,2009:95-104.
    [108]Liu Q, Sung A H, Qiao M. Temporal derivative-based spectrum and mel-cepstrum audio steganalysis [J]. Information Forensics and Security, IEEE Transactions on,2009,4(3): 359-368.
    [109]Qiao M, Sung A H, Liu Q. Steganalysis of mp3stego[C]//Neural Networks,2009. IJCNN 2009. International Joint Conference on. IEEE,2009:2566-2571.
    [110]Hernandez-Castro J C, Tapiador J E, Palomar E, et al. Blind Steganalysis of Mp3stego[J]. Journal of Information Science & Engineering,2010,26(5).
    [111]Liu Q, Sung A H, Qiao M. Derivative-based audio steganalysis[J]. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP),2011,7(3):18.
    [112]Wei Y, Guo L, Wang Y, et al. A blind audio steganalysis based on feature fusion[J]. Journal of Electronics (China),2011,28(3):265-276.
    [113]Qiao M, Sung A H, Liu Q. MP3 audio steganalysis[J]. Information Sciences,2013,231: 123-134.
    [114]张园,黄永峰,肖博,等.基于滑动窗口的流媒体信息隐藏检测方法[J].第八届全国信息隐藏与多媒体安全学术大会湖南省计算机学会第十一届学术年会论文集,2009.
    [115]黄永峰,袁键,陈书梅,等.MSN语音流中隐蔽信道的检测方法[J].清华大学学报(自然科学版),2009,2.
    [116]贺欣,梁艳牛,夏牧.基于浊音特性的语音压缩域隐写分析[J][J].计算机研究与发展,2009,46(z1).
    [117]Qi D, Xijian P. Steganalysis of compressed speech based on histogram features[C]//Wireless Communications Networking and Mobile Computing (WiCOM),2010 6th International Conference on. IEEE,2010:1-4.
    [118]Ding Q, Ping X. Steganalysis of Analysis-by-Synthesis Compressed Speech[C]//Multimedia Information Networking and Security (MINES),2010 International Conference on. IEEE,2010:681-685.
    [119]丁琦,平西建.基于脉冲位置参数统计特征的压缩域语音隐写分析[J].计算机科学,2011,38(001):217-220.
    [120]Huang Y, Tang S, Bao C, et al. Steganalysis of compressed speech to detect covert voice over Internet protocol channels[J]. Information Security, IET,2011,5(1):26-32.
    [121]Li S, Tao H, Huang Y. Detection of quantization index modulation steganography in G. 723.1 bit stream based on quantization index sequence analysis[J]. Journal of Zhejiang University SCIENCE C,2012,13(8):624-634.
    [122]Zhao H, Ansari N. Detecting covert channels within VoIP[C]//Sarnoff Symposium (SARNOFF),2012 35th IEEE. IEEE,2012:1-6.
    [123]Arackaparambil C, Yan G, Bratus S, et al. On tuning the knobs of distribution-based methods for detecting VoIP covert channels[C]//System Science (HICSS),2012 45th Hawaii International Conference on. IEEE,2012:2431-2440.
    [124]Paolo Usai. AMR wideband speech codec; transcoding functions.3GPP TS 26.190.
    [125]Paolo Usai. AMR Wideband Speech Codec; Voice Activity Detection (VAD).3GPP TS 26.194.
    [126]Paolo Usai. AMR Speech Codec:Voice Activity Detector for AMR Speech Traffic Channels.3GPP 3G TS26.094.
    [127]Vapnik V. The nature of statistical learning theory[M]. springer,2000.
    [128]Chang C C, Lin C J. LIBSVM:a library for support vector machines[J]. ACM Transactions on Intelligent Systems and Technology (TIST),2011,2(3):27.
    [129]Shi Y Q, Chen C, Chen W. A Markov process based approach to effective attacking JPEG steganography[C]//Information hiding. Springer Berlin Heidelberg,2007:249-264.
    [130]Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Electronic Imaging 2007. International Society for Optics and Photonics. 2007:650503-650503-13.
    [131]Liu Q, Sung A H, Ribeiro B M, et al. Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting[C]//Neural Networks,2008. IJCNN 2008.(IEEE World Congress on Computational Intelligence). IEEE International Joint Conference on. IEEE,2008:3352-3357.
    [132]Sheikhan M, Assadollahi K., Hemmati E. High Quality Audio Steganography by Floating Substitution of LSBs in Wavelet Domain[J]. World Applied Sciences Journal,2010,10(12): 1501-1507.
    [133]Kirovski D. Malvar H S. Spread-spectrum watermarking of audio signals[J]. Signal Processing. IEEE Transactions on,2003,51(4):1020-1033.
    [134]Lee S K. Ho Y S. Digital audio watermarking in the cepstrum domain[J]. Consumer Electronics. IEEE Transactions on.2000,46(3):744-750.
    [135]Gruhl D, Lu A, Bender W. Echo hiding[C]//Information Hiding. Springer Berlin Heidelberg,1996:295-315.
    [136]Gopalan K, Wenndt S, Noga A, et al. Covert speech communication via cover speech by tone insertion[C]//Proc.2003 IEEE Aerospace Conference.2003,4:4_1647-4_1653.
    [137]Gopalan K, Wenndt S. Audio steganography for covert data transmission by imperceptible tone insertion[C]//Proc. The IASTED International Conference on Communication Systems And Applications (CSA 2004), Banff, Canada.2004.
    [138]3GPP TS 26.190 V6.1.1, Speech codec speech processing functions:Adaptive Multi-Rate-Wideband (AMR-WB) speech codec; Transcoding functions (Release 6),2005.
    [139]ITU-T Recommendation P.862.2. Wideband extension to Recommendation P.862 for the assessment of wideband telephone networks and speech codecs,2005.
    [140]ANSI-C code for the Adaptive Multi-Rate-Wideband (AMR-WB) speech codec (Release 9):http://www.3gpp.org/ftp/Specs/html-info/26173.htm,2010.
    [141]CMU Audio Databases:http://www.speech.cs.cmu.edu/databases/,2007.
    [142]Speech codec speech processing functions; Adaptive Multi-Rate-Wideband (AMR-WB) speech codec test sequences:http://www.3gpp.org/ftp/Specs/html-info/26174.htm,2010.
    [143]肖博,黄永峰.流媒体隐蔽通信系统模型及性能优化[J].西安电子科技大学学报,2008,35(3):554-558.
    [144]黄永峰,肖博,熊磊.基于分层模型的流媒体隐蔽通信方法.专利号:200810104402.
    [145]袁键,黄永峰,肖博,等.基于流媒体的隐蔽通信可靠传输机制的研究[J][J].计算机研究与发展,2009,46(z1):147.
    [146]Gu Y, Grossman R L. UDT:UDP-based data transfer for high-speed wide area networks [J]. Computer Networks,2007,51(7):1777-1799.
    [147]UDX. http://www.goodudx.com/web/index.php/site/index
    [148]袁炜.基于VoIP的实时隐蔽通信模型及同步机制研究[D].北京邮电大学,2010.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700