悉尼大学代写assignment:在VoIP的隐写技术的比较分析

悉尼大学代写assignment:在VoIP的隐写技术的比较分析

悉尼大学代写assignment:在VoIP的隐写技术的比较分析

发送隐藏信息隐写术的艺术,是自古以来使用的,并仍在使用某些应用程序。今天,这种艺术正在实施在互联网技术,被称为网络隐写术。随着互联网技术的进步,如VoIP,一个新的方向,发现隐写术,称为VoIP(Voice over Internet Protocol)隐写。隐写术对VoIP和实施各种技术分析这一建议的交易。在这个项目中,VoIP网络中建立隐蔽通道的各种技术的研究,并将合适的技术实现。

隐写术一直是一个重要的概念,自古以来,现在在现代时代,它已成为数字水印和版权的一个重要概念。一般情况下,隐写术是实现下的文本,图像,音频和视频。但是,随着互联网技术的发展,对实现VoIP的隐写术的各种方法被提出。这项建议背后的动机是军事用途,在VoIP通信世界侦探应用和版权。此外,实施伪装是对隐写分析来检测和阻止不良目的的隐写方法的第一步。如果VoIP的隐写术是在军事应用中的实现,可以将数据发送到世界甚至没有被注意到。如果是用于检测服务,机密数据可以发送开始在电话交谈时。如申请“Skype”,这可以用于版权-隐藏版权材料可以进行VoIP呼叫下可用。

随着网络和VoIP技术的改进,隐写术已经成为并行技术[ 1 ]。网络隐写术的主要目的是建立一个隐蔽通道,使得隐藏的数据可以通过这个隐蔽通道发送,而不被注意。例如,秘密数据可以转移在JPEG文件使用的最低有效位进行[ 2 ]。作为最不重要的位是只使用,隐藏的数据对图像的外观的影响较小。同样,信息也可以steganographed在音频/视频文件。

悉尼大学代写assignment:在VoIP的隐写技术的比较分析

The art of sending hidden messages steganography is used since the ancient time and is still under use for certain applications. Today this art is being implemented in Internet technology and is called Network Steganography. Along with advancement in Internet technology such as VoIP, a new direction is found for steganography, known as VoIP (Voice over Internet Protocol) steganography. This proposal deals with analysis and implementation of various technologies for steganography on VoIP. In this project, study of various techniques for establishing covert channels in VoIP, and implementation of a suitable technique will be made.

Steganography has been an important concept since the ancient time, and now in the modern era it has emerged as an important concept for digital watermarking and copyright. Generally, the steganography is implemented under text, image, audio, and video. But, along with the improvement in internet technology, various ways of implementing steganography on VoIP are being proposed. The motivation behind this proposal is its use in military, detective applications and copyrights in the world of VoIP communications. Moreover, implementing steganography is the first step toward steganalysis – the methods to detect and block steganography for bad purpose. If VoIP steganography is implemented in military applications, the data can be sent across the world without even being noticed. If it is used in detective services, confidential data can be sent underway while talking over the VoIP call. For applications such as “Skype”, this can be used for copyright – A hidden copyright material can be available under the ongoing VoIP call.

Along with improvements in network and VoIP technology, steganography has emerged as a parallel technology [1]. The primary aim of network steganography is to establish a covert channel such that hidden data can be sent through this covert channel without being noticed. For example, secret data can be transferred within jpeg files by using the least significant bits to carry it [2]. As the least significant bits are only used, the hidden data have less impact on the appearance of the images. Similarly, messages can also be steganographed in the audio/video files.

 

发表评论

电子邮件地址不会被公开。 必填项已用*标注