IBM Systems Journal
Eliminating Steganography in Internet Traffic with Active Wardens
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Allowable Propagation Delay for VoIP Calls of Acceptable Quality
AISA '02 Proceedings of the First International Workshop on Advanced Internet Services and Applications
Information Hiding in Real-Time VoIP Streams
ISM '07 Proceedings of the Ninth IEEE International Symposium on Multimedia
Covert Channels Based on Jitter Field of the RTCP Header
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
A Technique of Lossless Steganography for G.711 Telephony Speech
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
An M-sequence based steganography model for voice over IP
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
IEEE Spectrum
ReLACK: A Reliable VoIP Steganography Approach
SSIRI '11 Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
What are suspicious VoIP delays?
Multimedia Tools and Applications
VoIP steganography and its Detection—A survey
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
This paper presents first experimental results for an Internet Protocol (IP) telephony-based steganographic method called lost audio packets steganography (LACK). This method utilises the fact that in typical multimedia communication protocols such as Real-time Transport Protocol, excessively delayed packets are not used for the reconstruction of transmitted data at the receiver; that is, these packets are considered useless and discarded. The results presented in this paper were obtained on the basis of a functional LACK prototype and show the method's impact on the quality of voice transmission. Achievable steganographic bandwidth for the different IP telephony codecs is also calculated. Copyright © 2012 John Wiley & Sons, Ltd.