A VoIP-based Covert Communication Scheme Using Compounded Pseudorandom Sequence
نویسندگان
چکیده
Steganography over real-time streaming media is a novel and promising research subject. This paper performs steganography over a typical streaming media, Voice over IP (VoIP), and suggests a new covert communication scheme for interactive secret messages. To resist the statistical detection, a sophisticated compounded pseudorandom sequence, produced by a compounded pseudorandom number generator based on linear congruential generator and mersenne twiste generator, is used to encrypt secret messages in a real-time manner. Further, a custom-built synchronization mechanism based on protocol steganography for covert transmission of interactive secret messages is designed, which can effectively enhance the flexibility of the covert communication system. The effectiveness of the scheme is evaluated in StegVoIP, a covert communication system based on VoIP. The experimental results demonstrate that our techniques provide good security and transparency for transmitting secret messages while adequately meeting the real-time requirement of VoIP.
منابع مشابه
Security testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملRobust and Undetectable Covert Timing Channels for i.i.d. Traffic
Covert timing channels exploit inter-packet delays in network traffic to transmit secret messages. The two most important design goals are undetectability (the covert channel has to remain hidden to a potential adversary that is monitoring the inter-packet delay pattern) and robustness (messages can be decoded correctly even in presence of (maliciously) injected noise). In previous proposals un...
متن کاملDST approach to enhance audio quality on lost audio packet steganography
Lost audio packet steganography (LACK) is a steganography technique established on the VoIP network. LACK provides a high-capacity covert channel over VoIP network by artificially delaying and dropping a number of packets in use to convey stegnogram. However, the increasing loss of packets will hurt the quality of the VoIP service. The quality deterioration will not only affect the legitimate V...
متن کاملA Review on Covert Timing Channels & their Applications
Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...
متن کاملCovert Channels through External Interference
This paper introduces interference channels, a new kind of covert channel that works by creating external interference on a shared communications medium (such as a wireless network). Unlike previous covert channels, here the covert sender does not need to compromise an authorized sender or require the ability to send messages on the network, but only needs the ability to jam traffic for short i...
متن کامل