Steganography of VoIP Streams

  • Authors:
  • Wojciech Mazurczyk;Krzysztof Szczypiorski

  • Affiliations:
  • Faculty of Electronics and Information Technology, Institute of Telecommunications, Warsaw University of Technology, Warsaw, Poland 00-665;Faculty of Electronics and Information Technology, Institute of Telecommunications, Warsaw University of Technology, Warsaw, Poland 00-665

  • Venue:
  • OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols' fields and is known for IP, UDP or TCP protocols but has never been applied to RTP (Real-Time Transport Protocol) and RTCP (Real-Time Control Protocol) which are characteristic for VoIP. The second method, called LACK (Lost Audio Packets Steganography), provides hybrid storage-timing covert channel by utilizing delayed audio packets. The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.