• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

网络电话中的隐写术与隐写分析技术综述

Steganography and Steganalysis in Voice over IP: A Review.

机构信息

School of Electronics & Information & Automation, Civil Aviation University of China, Tianjin 300300, China.

出版信息

Sensors (Basel). 2021 Feb 3;21(4):1032. doi: 10.3390/s21041032.

DOI:10.3390/s21041032
PMID:33546240
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7913304/
Abstract

The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the channel to prevent privacy leakage and ensure data security; second, for illegal users, the use of VoIP Voice communication hides and transmits illegal information, leading to security incidents. Therefore, in recent years, steganography and steganography analysis based on VoIP have gradually become research hotspots in the field of information security. Steganography and steganalysis based on VoIP can be divided into two categories, depending on where the secret information is embedded: steganography and steganalysis based on voice payload or protocol. The former mainly regards voice payload as the carrier, and steganography or steganalysis is performed with respect to the payload. It can be subdivided into steganography and steganalysis based on FBC (fixed codebook), LPC (linear prediction coefficient), and ACB (adaptive codebook). The latter uses various protocols as the carrier and performs steganography or steganalysis with respect to some fields of the protocol header and the timing of the voice packet. It can be divided into steganography and steganalysis based on the network layer, the transport layer, and the application layer. Recent research results of steganography and steganalysis based on protocol and voice payload are classified in this paper, and the paper also summarizes their characteristics, advantages, and disadvantages. The development direction of future research is analyzed. Therefore, this research can provide good help and guidance for researchers in related fields.

摘要

VoIP(网络电话)的快速发展和普及也带来了安全问题。基于 VoIP 的安全语音通信有两个方面:一方面,对于合法用户,可以将秘密语音嵌入载体中,并在信道中安全传输,防止隐私泄露,确保数据安全;另一方面,对于非法用户,可以利用 VoIP 语音通信进行隐藏和传输非法信息,从而导致安全事件。因此,近年来,基于 VoIP 的隐写术和隐写分析逐渐成为信息安全领域的研究热点。基于 VoIP 的隐写术和隐写分析可以分为两类,这取决于秘密信息嵌入的位置:基于语音有效负载或协议的隐写术和隐写分析。前者主要将语音有效负载视为载体,并针对有效负载进行隐写术或隐写分析。它可以进一步细分为基于固定码本(FBC)、线性预测系数(LPC)和自适应码本(ACB)的隐写术和隐写分析。后者使用各种协议作为载体,并针对协议头和语音数据包的定时的某些字段进行隐写术或隐写分析。它可以分为基于网络层、传输层和应用层的隐写术和隐写分析。本文对基于协议和语音有效负载的隐写术和隐写分析的最新研究成果进行了分类,并总结了它们的特点、优势和劣势。分析了未来研究的发展方向。因此,这项研究可以为相关领域的研究人员提供良好的帮助和指导。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/2139c1855e81/sensors-21-01032-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/598220998667/sensors-21-01032-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/63dbf1f4fe42/sensors-21-01032-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/24a97acc332c/sensors-21-01032-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/738468bbc4c2/sensors-21-01032-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/b6fcdca8c770/sensors-21-01032-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/eb8638f69da3/sensors-21-01032-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/2139c1855e81/sensors-21-01032-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/598220998667/sensors-21-01032-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/63dbf1f4fe42/sensors-21-01032-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/24a97acc332c/sensors-21-01032-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/738468bbc4c2/sensors-21-01032-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/b6fcdca8c770/sensors-21-01032-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/eb8638f69da3/sensors-21-01032-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/df9c/7913304/2139c1855e81/sensors-21-01032-g007.jpg

相似文献

1
Steganography and Steganalysis in Voice over IP: A Review.网络电话中的隐写术与隐写分析技术综述
Sensors (Basel). 2021 Feb 3;21(4):1032. doi: 10.3390/s21041032.
2
Image steganography without embedding by carrier secret information for secure communication in networks.通过载体秘密信息进行无嵌入的图像隐写术,用于网络中的安全通信。
PLoS One. 2024 Sep 6;19(9):e0308265. doi: 10.1371/journal.pone.0308265. eCollection 2024.
3
LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.基于最低有效位的预嵌入视频隐写术与旋转和移位多模式块矩阵。
PeerJ Comput Sci. 2022 Jan 6;8:e843. doi: 10.7717/peerj-cs.843. eCollection 2022.
4
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review.用于抵御统计隐写分析攻击的图像隐写技术:一项系统的文献综述
PLoS One. 2024 Sep 16;19(9):e0308807. doi: 10.1371/journal.pone.0308807. eCollection 2024.
5
ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks.基于深度卷积去噪自动编码器和孪生网络的 JPEG 图像高级瘦身 StegAnalysis 检测框架(ASSAF)。
Neural Netw. 2020 Nov;131:64-77. doi: 10.1016/j.neunet.2020.07.022. Epub 2020 Jul 29.
6
Locating secret messages based on quantitative steganalysis.基于定量隐写分析的秘密信息定位。
Math Biosci Eng. 2019 May 30;16(5):4908-4922. doi: 10.3934/mbe.2019247.
7
SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.SteganoCNN:基于卷积神经网络的具有泛化能力的图像隐写术
Entropy (Basel). 2020 Oct 8;22(10):1140. doi: 10.3390/e22101140.
8
Security-oriented steganographic payload allocation for multi-remote sensing images.面向安全的多遥感图像隐写载荷分配
Sci Rep. 2024 Feb 28;14(1):4826. doi: 10.1038/s41598-024-55474-y.
9
Three-Dimensional Mesh Steganography and Steganalysis: A Review.三维网格隐写术与隐写分析综述
IEEE Trans Vis Comput Graph. 2022 Dec;28(12):5006-5025. doi: 10.1109/TVCG.2021.3075136. Epub 2022 Oct 26.
10
Composition-Aware Image Steganography Through Adversarial Self-Generated Supervision.通过对抗性自生成监督实现的成分感知图像隐写术
IEEE Trans Neural Netw Learn Syst. 2023 Nov;34(11):9451-9465. doi: 10.1109/TNNLS.2022.3175627. Epub 2023 Oct 27.

引用本文的文献

1
A deep learning-driven multi-layered steganographic approach for enhanced data security.一种用于增强数据安全性的深度学习驱动的多层隐写方法。
Sci Rep. 2025 Feb 8;15(1):4761. doi: 10.1038/s41598-025-89189-5.
2
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review.用于抵御统计隐写分析攻击的图像隐写技术:一项系统的文献综述
PLoS One. 2024 Sep 16;19(9):e0308807. doi: 10.1371/journal.pone.0308807. eCollection 2024.

本文引用的文献

1
Research on covert communication channel based on modulation of common compressed speech codec.基于常见压缩语音编解码器调制的隐蔽通信信道研究
Neural Comput Appl. 2022;34(14):11507-11520. doi: 10.1007/s00521-020-04882-y. Epub 2020 Apr 13.
2
The primary cilium as sensor of fluid flow: new building blocks to the model. A review in the theme: cell signaling: proteins, pathways and mechanisms.作为流体感受器的初级纤毛:模型的新构建块。本期主题综述:细胞信号转导:蛋白质、途径和机制。
Am J Physiol Cell Physiol. 2015 Feb 1;308(3):C198-208. doi: 10.1152/ajpcell.00336.2014. Epub 2014 Nov 26.