Publication Type : Book Chapter
Thematic Areas : TIFAC-CORE in Cyber Security
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2
Source : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 489-494). Springer India.
Campus : Coimbatore
School : School of Engineering, Centre for Cybersecurity Systems and Networks
Center : TIFAC CORE in Cyber Security
Department : cyber Security
Year : 2015
Abstract : This paper prevents the steganographic method for IP telephony called transcoding steganography (TranSteg). Typically, in TranSteg, it is the overt data that is to compress to make space for steganogram. TranSteg finds appropriate codec that will result in the voice quality similar to the original. In signature-based system, the signature of the voice payload is appended to the packet to provide integrity. The signature of the data becomes invalid when there is some change in voice data. This method detects the hidden communication between a VoIP call. The signature-based scheme concept is described in this paper.