IBM Systems Journal
A note on the confinement problem
Communications of the ACM
Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Tracking anonymous peer-to-peer VoIP calls on the internet
Proceedings of the 12th ACM conference on Computer and communications security
DSSS-Based Flow Marking Technique for Invisible Traceback
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Potential of Value-Added Speech Communications by Using Steganography
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 02
Information Hiding in Real-Time VoIP Streams
ISM '07 Proceedings of the Ninth IEEE International Symposium on Multimedia
Covert Channels Based on Jitter Field of the RTCP Header
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Perceptually Transparent Information Hiding in G.729 Bitstream
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Implementation of Covert Communication Based on Steganography
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
A Technique of Lossless Steganography for G.711 Telephony Speech
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
NCM '09 Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC
Steganography in Digital Media: Principles, Algorithms, and Applications
Steganography in Digital Media: Principles, Algorithms, and Applications
Approach to hide secret speech information in G.721 scheme
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Pros and cons of mel-cepstrum based audio steganalysis using SVM classification
IH'07 Proceedings of the 9th international conference on Information hiding
An M-sequence based steganography model for voice over IP
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
IEEE Spectrum
Covert channels through external interference
WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies
Secure Hybrid Spread Spectrum System for Steganography in Auditive Media
IIH-MSP '10 Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
A Semi-lossless Steganography Technique for G.711 Telephony Speech
IIH-MSP '10 Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Adaptive partial-matching steganography for voice over IP using triple M sequences
Computer Communications
An Entropy-Based Approach to Detecting Covert Timing Channels
IEEE Transactions on Dependable and Secure Computing
Adaptive VoIP Steganography for Information Hiding within Network Audio Streams
NBIS '11 Proceedings of the 2011 14th International Conference on Network-Based Information Systems
ReLACK: A Reliable VoIP Steganography Approach
SSIRI '11 Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
A Novel Phase Coding Technique for Steganography in Auditive Media
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
New VoIP traffic security scheme with digital watermarking
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Syntax and semantics-preserving application-layer protocol steganography
IH'04 Proceedings of the 6th international conference on Information Hiding
G.711-Based adaptive speech information hiding approach
ICIC'06 Proceedings of the 2006 international conference on Intelligent Computing - Volume Part I
On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert Channels
HICSS '12 Proceedings of the 2012 45th Hawaii International Conference on System Sciences
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
What are suspicious VoIP delays?
Multimedia Tools and Applications
A Survey of Covert Channels and Countermeasures in Computer Network Protocols
IEEE Communications Surveys & Tutorials
On the anonymity and traceability of peer-to-peer VoIP calls
IEEE Network: The Magazine of Global Internetworking
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec
IEEE Transactions on Information Forensics and Security
Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography
The Computer Journal
Lost audio packets steganography: the first practical evaluation
Security and Communication Networks
Hi-index | 0.00 |
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic methods are usually aimed at hiding the very existence of the communication. Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect carrier for steganographic purposes. This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.