Securing voice communications using audio steganography

Phipps, Anthony, Ouazzane, Karim and Vassilev, Vassil (2022) Securing voice communications using audio steganography. International Journal of Computer Network and Information Security (IJCNIS), 14 (3). pp. 1-18. ISSN 2074-9090

Steg_paper_IJCNIS.pdf - Accepted Version

Download (1MB) | Preview
Official URL:

Abstract / Description

Although authentication of users of digital voice-based systems has been addressed by much research and many commercially available products, there are very few that perform well in terms of both usability and security in the audio domain. In addition, the use of voice biometrics has been shown to have limitations and relatively poor performance when compared to other authentication methods. We propose using audio steganography as a method of placing authentication key material into sound, such that an authentication factor can be achieved within an audio channel to supplement other methods, thus providing a multi factor authentication opportunity that retains the usability associated with voice channels. In this research we outline the challenges and threats to audio and voice-based systems in the form of an original threat model focusing on audio and voice-based systems, we outline a novel architectural model that utilises audio steganography to mitigate the threats in various authentication scenarios and finally, we conduct experimentation into hiding authentication materials into an audible sound. The experimentation focused on creating and testing a new steganographic technique which is robust to noise, resilient to steganalysis and has sufficient capacity to hold cryptographic material such as a 2048 bit RSA key in a short audio music clip of just a few seconds achieving a signal to noise ratio of over 70 dB in some scenarios. The method developed was seen to be very robust using digital transmission which has applications beyond this research. With acoustic transmission, despite the progress demonstrated in this research some challenges remain to ensure the approach achieves its full potential in noisy real-world applications and therefore the future research direction required is outlined and discussed.

Item Type: Article
Uncontrolled Keywords: cyber security; audio security; steganography; user experience; accessibility
Subjects: 000 Computer science, information & general works
Department: School of Computing and Digital Media
Depositing User: Vassil Vassilev
Date Deposited: 10 Mar 2022 09:31
Last Modified: 11 Jan 2024 14:44


Downloads per month over past year

Downloads each year

Actions (login required)

View Item View Item