{"title":"基于DNA隐写和身份验证的VoIP无覆盖数据隐藏","authors":"Deepikaa Soundararajan, Saravanan Ramakrishnan","doi":"10.34028/iajit/20/2/5","DOIUrl":null,"url":null,"abstract":"Data hiding in Voice over Internet Protocol (VoIP) using coverless approach improves the undetectability by preserving the cover bits from modification. This paper focuses on hiding the secret message in VoIP streams using Deoxyribonucleic Acid (DNA) steganography approach. DNA steganography is known for its low cracking probability. The embedding process is done in two steps. The first step converts the VoIP sample, secret message and a user generated key (for Authentication) into m-RNA pattern during transcription and the second step converts the m-RNA to form a triplet during translation process to create a protein array, where the secret message is embedded. The secret message is extracted from the protein array by applying reverse translation and Transcription. The proposed approach improves the undetectability by leaving the cover bits unmodified with PESQ values 84% comparatively greater than the state of art techniques.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"15 1","pages":"190-198"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Coverless data hiding in VoIP based on DNA steganography with authentication\",\"authors\":\"Deepikaa Soundararajan, Saravanan Ramakrishnan\",\"doi\":\"10.34028/iajit/20/2/5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data hiding in Voice over Internet Protocol (VoIP) using coverless approach improves the undetectability by preserving the cover bits from modification. This paper focuses on hiding the secret message in VoIP streams using Deoxyribonucleic Acid (DNA) steganography approach. DNA steganography is known for its low cracking probability. The embedding process is done in two steps. The first step converts the VoIP sample, secret message and a user generated key (for Authentication) into m-RNA pattern during transcription and the second step converts the m-RNA to form a triplet during translation process to create a protein array, where the secret message is embedded. The secret message is extracted from the protein array by applying reverse translation and Transcription. The proposed approach improves the undetectability by leaving the cover bits unmodified with PESQ values 84% comparatively greater than the state of art techniques.\",\"PeriodicalId\":13624,\"journal\":{\"name\":\"Int. Arab J. Inf. Technol.\",\"volume\":\"15 1\",\"pages\":\"190-198\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. Arab J. Inf. Technol.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.34028/iajit/20/2/5\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. Arab J. Inf. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.34028/iajit/20/2/5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Coverless data hiding in VoIP based on DNA steganography with authentication
Data hiding in Voice over Internet Protocol (VoIP) using coverless approach improves the undetectability by preserving the cover bits from modification. This paper focuses on hiding the secret message in VoIP streams using Deoxyribonucleic Acid (DNA) steganography approach. DNA steganography is known for its low cracking probability. The embedding process is done in two steps. The first step converts the VoIP sample, secret message and a user generated key (for Authentication) into m-RNA pattern during transcription and the second step converts the m-RNA to form a triplet during translation process to create a protein array, where the secret message is embedded. The secret message is extracted from the protein array by applying reverse translation and Transcription. The proposed approach improves the undetectability by leaving the cover bits unmodified with PESQ values 84% comparatively greater than the state of art techniques.