• Corpus ID: 7292767

Hiding Data in VoIP

  title={Hiding Data in VoIP},
  author={J{\'o}zef Lubacz and Wojciech Mazurczyk and Krzysztof Szczypiorski},
Abstract : The paper presents and compares steganographic techniques that can be used to enable hidden communication within computer networks. A new class ("steganophony") of such methods is introduced. Specific methods proposed by the authors - LACK, HICCUPS and SIP-based VoIP protocols' steganography - are briefly described. The main aim of network steganography is to hide secret data in users' normal data transmissions, ideally, so it cannot be detected by third parties. One of the most… 

Figures from this paper

VoIP steganography and its Detection—A survey
This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.
ANewHybridMethod for VoIP Stream Steganography
The experimental results show that LASB is superior to both LACK and LSB in many aspects, as well as being more robust because of diversifying the source of data embedding.
Steganography of Hypertext Transfer Protocol Version 2 (HTTP/2)
Nine new covert channels which utilize the new standard, HTTP/2, and which can be used regardless of its transport carrier (TLS or clear TCP) are presented.
Future of Data Hiding: A Walk Through Conventional to Network Steganography
In this paper various works recently done in the area of different categories of network security has been discussed and analyzed so as to find scope for future research.
State-based steganography in low bit rate speech
A state-based steganography method which fully investigates speech frame features in order to expand embedding capabilities and enhance Steganography security and the experimental results have demonstrated that statebased method outperforms traditional LSB substitution in overall performance and introduces limited latency, which meets the realtime requirement in covert communications.
Hiding Information in Retransmissions
The paper presents a new steganographic method called RSTEG (Retransmission Steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
Retransmission steganography and its detection
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
Covert channel detection in VoIP streams
This paper presents two approaches to detect VoIP covert channel communications using compressed versions of the data packets. The approach is based on specialized random projection matrices that
Improving Network Reliability and QOS in EOIPThrough Application Layer Signaling Protocol(RTP)
The scope of this paper will prove that real time application i.e. RTP& RTCP as a Application Layer Signaling Control Protocol in EOIP network will ensure the bare minimum packet loss(pay load) for telephony.
A Covert Channel in RTP Protocol
A new covert channel over the RTP protocol is designed and implemented by modifying the timestamp value in the R TP header, which is very difficult to detect due to expected variations in the timestamp field and the flexible nature of RTP.


Steganography of VoIP Streams
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
Information hiding-a survey
An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
HICCUPS : Hidden Communication System for Corrupted Networks
All functional parts of the HICCUPS (HIdden Communication system for CorrUPted networkS), a steganographic system dedicated to shared medium networks including wireless local area networks, are discussed.
Practical Internet Steganography : Data Hiding in IP
This paper investigates practical techniques and uses of Internet steganography and facilitates the interaction of fundamental steganographic principles with the existing network security environment to more generally bridge the areas of data hiding, network protocols and security.
A survey of covert channels and countermeasures in computer network protocols
A survey of the existing techniques for creating covert channels in widely deployed network and application protocols and an overview of common methods for their detection, elimination, and capacity limitation, required to improve security in future computer networks are given.
Embedding Covert Channels into TCP/IP
By examining TCP/IP specifications and open source implementations, tests to detect the use of naive embedding are developed and reversible transforms that map block cipher output onto TCP ISNs are described, indistinguishable from those generated by Linux and OpenBSD.
Analysis of a procedure for inserting steganographic data into VoIP calls
Analysis of the dependence of the insertion procedure on the probability distribution of VoIP call duration and the performance of the method under the name LACK is focused on.
Detection of Covert Channel Encoding in Network Packet Delays
This paper investigates the channel capacity of Internet-based timing channels and proposes a methodology for detecting covert timing channels based on how close a source comes to achieving that channel capacity.
Secure spread spectrum watermarking for multimedia
It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Communication using phantoms: covert channels in the Internet
  • S. ServettoM. Vetterli
  • Computer Science
    Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)
  • 2001
The main finding is that the use of inefficient codes to represent data that is intended to be used solely for network control operations (such as routing, sequencing, etc.), gives rise to the unintended creation of a covert channel.