Information communication is one of the most significant features of an information society. As an important part of information communication, secure communication protects state secrets, commercial secrets, and personal privacy, which is crucial for the nation, society, and individuals. Human beings are living in an information society, and communication security and confidentiality are used not only for military purposes, but also for public life, such as network voice communication, mobile communication, electronic payment, and mobile banking on the Internet
[1].
There are many kinds of methods for secure communication over networks, although the available methods have different levels of shortcomings
[2]. New approaches of secure speech communication are proposed to transmit security information via Voice over Internet Protocol (VoIP) and Public Switched Telephone Network (PSTN) based on the techniques of information hiding discussed in this chapter.
1.1. Background
With the development of network communication technology, speech communication technology has seen a gradual transition to VoIP communication from the original PSTN network communication
[3]. At present, the speech communication network has become a hotspot in international and domestic telecommunications development. More and more speech services through networks are realized.
As we know, network-based threats have become more sophisticated, and PSTN and VoIP calls are vulnerable to threats such as session hijacking and man-in-the-middle attacks
[2]. Without proper protective measures, attackers could intercept a PSTN or VoIP call and modify the call parameters or addresses (numbers). Even without modifying PSTN numbers or VoIP packets, attackers may be able to eavesdrop on telephone conversations being carried over a PSTN or VoIP network. If VoIP packets are traveling unprotected over the Internet, the attackers have the opportunity to access the information that these packets carry
[4–7].
With a standard PSTN or VoIP connection, intercepting conversations requires physical access to telephone lines or access to the private branch exchange (PBX) and switch or router. Speech or data networks, which typically use the public Internet and the TCP/IP protocol stack, need safeguards to protect data security and personal privacy. In this context, the research of speech secure communication is particularly important
[8].
1.1.1. Progress in Secure Communication
The traditional speech secure communication technology mainly adopts the methods of Analog Scrambling
[9,10] and Digitized Encryption
[11,12]. Analog Scrambling is performed by segmenting and then scrambling the speech signals in the frequency domain, time domain, or both domains at the same time in order to change the intelligible speech signals into unintelligible signals. In Digitized Encryption, the speech signal is digitalized and then encrypted. Both of these traditional approaches rely on the transformation of speech signals themselves and cryptographic strength to protect the security communication of secret information. In recent decades, cryptographic strength has continuously improved. By contrast, the development of speech secure communication systems has been slow. The encryption system of Analog Scrambling has poor security performance, but with the development of voice signal digital technology, Digitized Encryption is widely used in speech secure communication
[13,14].
At present, there are many successful encryption algorithms in modern cryptography technology, and their confidentiality is extremely high. So far, the most successful method of secure communication is implemented by data encryption, which has a certain degree of security and is easy to implement. But this method has inherent shortcomings
[15,16].
First, most of the current encryption algorithms are designed through specific calculation procedures. The strength of encryption algorithms depends on the computing capacity of the computer in use, and the improvement in the rate of undecipherable passwords relies on increasing the length of the key. With the rapid growth of the computing power of computers, password security is always faced with new challenges.
Second, the approach transforms plain text into cipher text by using an encryption algorithm, and then the cipher text is transferred to the open channel. The encrypted data stream is almost random and meaningless gibberish, implying the encrypted information is important and secret, and attracts attackers’ attention. By monitoring the communication channel, attackers can easily identify the encrypted information. Once gibberish is intercepted, the target of the attack will be found. Various kinds of attack methods can be used for cryptanalysis.
Third, in the case of a small amount of secret information exposure, attackers can gain valuable information by analyzing the characteristics of disclosure information and tracing the content of secret information, even though attackers cannot decode the messages to gain the entire secret content.
The traditional secure telephony based on an encryption system has the same drawbacks
[17]. The transferred speech information is hidden in the cipher text. For the eavesdropper, the intercepted information has a high degree of ambiguity, or it can be seen as a kind of interference or noise. Undoubtedly, the communication performance of such a secure communication system can be designed perfectly, but its security performance might not be optimal. Once the secure communication lines were monitored and detected by eavesdroppers, two actions the eavesdroppers may take are:
1. Intercepting secret information from the communication channel carefully and deciphering the information meticulously.
2. Destroying the secure communication line and preventing the transfer of confidential information.
Moreover, the encryption method of the traditional secure telephone is in the time domain or frequency domain, which has two shortcomings:
1. The encryption algorithms and methods are limited, and most of them are based on the analog signal. Encrypted information is easily detected and destroyed.
2. The process of encryption and decryption may lead to different degrees of decline in the quality of the original speech signal.
In addition, a relatively new type of secure communication is chaotic secure communication
[18,19]. This approach mainly makes use of the chaos system’s sensitivity to the initial state and parameter dependence to protect the security of confidential information communication. Although chaotic secure communication has been a breakthrough in theoretical and experimental studies, there are still more practical application issues left, and many practical problems such as system synchronization need to be solved
[20].
Whenever multimedia data—for example, speech—are transmitted via a network, they need to be protected from manipulation, forgery, and theft. More elaborate attacks demand more sophisticated security technologies, which have to be optimized for the particular requirements of each application scenario. A newly developed technique of information security, information hiding, breaks the traditional cryptology thought concepts. Information hiding technology carefully examines information security from a new perspective
[21]. Traditional secure communication approaches cannot satisfy the current security requirements, because the garbled bits are likely to attract attention or even attacks from others. It is imperative to introduce a new mechanism for secure communication, which is why we address this issue. Compared with traditional secure communication and chaotic secure communication, secure communication based on information hiding technology has several distinctive characteristics for secure communication. The most important characteristics are univocal and continuous plain text speech signals that are transmitted on the communication line, so secure communication will be more covert and safer
[22].
Traditional secure communication depends mainly on the strength of encryption algorithms. However, with the advent of the...