Improved Port Knocking with Strong Authentication
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
SecSyslog: an Approach to Secure Logging Based on Covert Channels
SADFE '05 Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering on Systematic Approaches to Digital Forensic Engineering
Video Traces for Network Performance Evaluation: A Comprehensive Overview and Guide on Video Traces and Their Utilization in Networking Research
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
ACM Transactions on Information and System Security (TISSEC)
Covert messaging through TCP timestamps
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Hiding Data in Multimedia Streaming over Networks
CNSR '10 Proceedings of the 2010 8th Annual Communication Networks and Services Research Conference
Syntax and semantics-preserving application-layer protocol steganography
IH'04 Proceedings of the 6th international conference on Information Hiding
A Survey of Covert Channels and Countermeasures in Computer Network Protocols
IEEE Communications Surveys & Tutorials
State-based steganography in low bit rate speech
Proceedings of the 20th ACM international conference on Multimedia
Hi-index | 0.00 |
This paper presents steganography methods to covertly transmit data via RTP (Real-time Transport Protocol) header and RTP payload in multimedia streaming over networks. The proposed covert channels do not change the original traffic pattern. The bandwidth and the impact of the proposed covert channels on the received video quality are analyzed. Steganalysis of the proposed hiding methods is also discussed and the proposed covert channels cannot be detected by traffic pattern, received video quality, or the statistical property required by the standard. Simulations on real video traces and RTP packets collected from multicasting videos to LAN (Local Area Network) are conducted and the results show the proposed covert channels not only achieve relatively high bandwidth but also keep the received video quality high or unchanged. Those features make the proposed covert channels practical and not easy to be detected.