Publication Type : Book Chapter
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2
Source : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 379-387). Springer India.
Campus : Coimbatore
School : School of Engineering, Centre for Cybersecurity Systems and Networks
Center : TIFAC CORE in Cyber Security
Department : cyber Security
Year : 2015
Abstract : The latest studies and applications in steganography are based on Internet, particularly voice over IP (VoIP). VoIP has proved itself to be a perfect carrier for hidden data. Most of the approaches for VoIP steganalysis focus on detecting hidden data in the payload of the packets, by extending audio steganalysis methods. Here, we propose an effective steganalysis method which considers the speech behavior as well as network protocol structure to detect hidden communication. The common statistical features, like mean, covariance, etc., are also considered for effective classification.