IBM Systems Journal
Information Hiding through Noisy Channels
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Eliminating Steganography in Internet Traffic with Active Wardens
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Allowable Propagation Delay for VoIP Calls of Acceptable Quality
AISA '02 Proceedings of the First International Workshop on Advanced Internet Services and Applications
Covert messaging through TCP timestamps
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
New VoIP traffic security scheme with digital watermarking
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
A Survey of Covert Channels and Countermeasures in Computer Network Protocols
IEEE Communications Surveys & Tutorials
Adaptive partial-matching steganography for voice over IP using triple M sequences
Computer Communications
Hiding information in a Stream Control Transmission Protocol
Computer Communications
What are suspicious VoIP delays?
Multimedia Tools and Applications
Steganography in streaming multimedia over networks
Transactions on Data Hiding and Multimedia Security VII
Lost audio packets steganography: the first practical evaluation
Security and Communication Networks
VoIP steganography and its Detection—A survey
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols' fields and is known for IP, UDP or TCP protocols but has never been applied to RTP (Real-Time Transport Protocol) and RTCP (Real-Time Control Protocol) which are characteristic for VoIP. The second method, called LACK (Lost Audio Packets Steganography), provides hybrid storage-timing covert channel by utilizing delayed audio packets. The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.