On steganography in lost audio packets

  title={On steganography in lost audio packets},
  author={Wojciech Mazurczyk and J{\'o}zef Lubacz and Krzysztof Szczypiorski},
  journal={Secur. Commun. Networks},
This paper presents a new hidden data insertion procedure based on the estimated probability of the remaining time of the call for the steganographic method called lost audio packets (LACK) steganography. LACK provides hidden communication for real-time services such as voice over IP. The analytical results presented in this paper concern the influence of LACK's hidden data insertion procedures on the quality of voice transmission and the resistance to steganalysis. The proposed hidden data… 
MoveSteg: A Method of Network Steganography Detection
A new method for detecting a source point of time based network steganography - MoveSteg is presented, which allows finding the source of Steganography stream in network that is under the authors' management.
New High Secure Network Steganography Method Based on Packet Length
The main goal of this paper is to propose a method which has great resistance to network traffic detections and which, despite having low embedding capacity, will be more secure in real traffic compared to the other methods.
ANewHybridMethod for VoIP Stream Steganography
The experimental results show that LASB is superior to both LACK and LSB in many aspects, as well as being more robust because of diversifying the source of data embedding.
DST approach to enhance audio quality on lost audio packet steganography
The proposed DST-based method demonstrates the possibilities in exploiting the perceptual space of the multimedia signal and results show that the DST on LACK achieves up to 24 % more capacity over the LACK scheme.
YouSkyde: information hiding for Skype video traffic
The results obtained prove that the proposed YouSkyde method for Skype videoconference calls is feasible and offer a steganographic bandwidth as high as 0.93 kbps, while introducing negligible distortions into transmission quality and providing high undetectability.
Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation
A fractal-based VoIP steganographic approach was proposed to realize covert VoIP communications in the presence of packet loss, and the experimental results indicated that the speech quality degradation increased with the escalating packet-loss level.


LACK—a VoIP steganographic method
The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’'s impact on quality of voice transmission and its resistance to steganalysis.
Analysis of a procedure for inserting steganographic data into VoIP calls
Analysis of the dependence of the insertion procedure on the probability distribution of VoIP call duration and the performance of the method under the name LACK is focused on.
Steganography of VoIP Streams
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
Eliminating Steganography in Internet Traffic with Active Wardens
This paper examines the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall, and introduces the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications.
Understanding VoIP from Backbone Measurements
Results show that the technology is mature to make the final step, allowing the integration of data and real-time services over the Internet, and highlight that, among loss, delay and jitter, only the first index may affect the VoIP call quality.
Allowable Propagation Delay for VoIP Calls of Acceptable Quality
E-model is used to evaluate voice quality for end-to-end voice services over IP-based network and the allowable propagation delay budgets for each codec are provided in order to offer voice calls of acceptable quality in the IP telephony system.
Handbook of Research on Secure Multimedia Distribution
The Handbook of Research on Secure Multimedia Distribution provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques.
RTP Control Protocol Extended Reports (RTCP XR)
This document defines the Extended Report (XR) packet type for the RTP Control Protocol (RTCP), and defines how the use of XR packets can be signaled by an application if it employs the Session
Automated analysis of network QoS parameters for Voice over IP applications
This paper presents technology for monitoring and assessment of network QoS parameter for Voice over IP (VoIP) applications in inter-domain environment. The technology is based on automated analysis
RTP: A Transport Protocol for Real-Time Applications
RTP provides end-to-end network transport functions suitable for applications transmitting real-time data over multicast or unicast network services and is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks.