Securing Voice Communications Using Audio Steganography
-
Published:2022-06-08
Issue:3
Volume:14
Page:1-18
-
ISSN:2074-9090
-
Container-title:International Journal of Computer Network and Information Security
-
language:
-
Short-container-title:IJCNIS
Author:
Phipps Anthony, ,Ouazzane Karim,Vassilev Vassil
Abstract
Although authentication of users of digital voice-based systems has been addressed by much research and many commercially available products, there are very few that perform well in terms of both usability and security in the audio domain. In addition, the use of voice biometrics has been shown to have limitations and relatively poor performance when compared to other authentication methods. We propose using audio steganography as a method of placing authentication key material into sound, such that an authentication factor can be achieved within an audio channel to supplement other methods, thus providing a multi factor authentication opportunity that retains the usability associated with voice channels. In this research we outline the challenges and threats to audio and voice-based systems in the form of an original threat model focusing on audio and voice-based systems, we outline a novel architectural model that utilises audio steganography to mitigate the threats in various authentication scenarios and finally, we conduct experimentation into hiding authentication materials into an audible sound. The experimentation focused on creating and testing a new steganographic technique which is robust to noise, resilient to steganalysis and has sufficient capacity to hold cryptographic material such as a 2048 bit RSA key in a short audio music clip of just a few seconds achieving a signal to noise ratio of over 70 dB in some scenarios. The method developed was seen to be very robust using digital transmission which has applications beyond this research. With acoustic transmission, despite the progress demonstrated in this research some challenges remain to ensure the approach achieves its full potential in noisy real-world applications and therefore the future research direction required is outlined and discussed.
Subject
Applied Mathematics,Computer Networks and Communications,Computer Science Applications,Safety Research,Information Systems,Software
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Novel Voice-based Authentication for Mission-critical Operations;2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT);2024-04-29
2. Security enhancement of LSB-based audio steganography method;2023 Zooming Innovation in Consumer Technologies Conference (ZINC);2023-05-29
3. Network Security Analytics on the Cloud: Public vs. Private Case;2023 13th International Conference on Cloud Computing, Data Science & Engineering (Confluence);2023-01-19