Steganography of VoIP Streams

نویسندگان

  • Wojciech Mazurczyk
  • Krzysztof Szczypiorski
چکیده

The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols’ fields and is known for IP, UDP or TCP protocols but has never been applied to RTP (Real-Time Transport Protocol) and RTCP (Real-Time Control Protocol) which are characteristic for VoIP. The second method, called LACK (Lost Audio Packets Steganography), provides hybrid storage-timing covert channel by utilizing delayed audio packets. The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Steganography In Inactive Frames Of Voip

This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which isused extensively in Voice over Internet Protocol (VoIP). This study reveals that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the st...

متن کامل

Steganography in Audio Files by Entropy using FEC as Reed–Solomon of VOIP Streams

In this paper introduce a novel technique to identify the voice (active frames) and silent regions (inactive frames) of a speech stream very much suitable for VoIP calls. Thus here the proposed a better voice activity detection based on the entropy algorithm. High-capacity steganography algorithm for embedding data in the inactive frames . Then inactive frames are encoded by G. 723. 1 source co...

متن کامل

An Information- Theoretical Model for Streaming Media Based Stegosystems

Steganography in streaming media differs from steganography in images or audio files because of the continuous embedding process and the necessary synchronization of sender and receiver due to packet loss in streaming media. The conventional theoretical model for image steganography is not appropriate for explaining the security scenarios for streaming media based stegosystems. In this paper, w...

متن کامل

LACK - a VoIP Steganographic Method

The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’s impact on quality of voice tran...

متن کامل

Advanced Integrated Steganographic Approach With VOIP Communication

Voice over IP (VOIP) is an upcoming technology that enables voice communication through the Internet. Packet-based network link shared between different connections, which give rise to interaction between various traffic types. This paper focus is on improving the data embedding capacity of steganography in low bit rate audio streams encoded by G711 source codec and to overcome the packet loss ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008