ReLACK: A Reliable VoIP Steganography Approach

  title={ReLACK: A Reliable VoIP Steganography Approach},
  author={Mohammad Hamdaqa and Ladan Tahvildari},
  journal={2011 Fifth International Conference on Secure Software Integration and Reliability Improvement},
  • Mohammad Hamdaqa, L. Tahvildari
  • Published 27 June 2011
  • Computer Science
  • 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
VoIP steganography is a real-time network steganography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret messages. Recently, there has been a noticeable increase in the interest in VoIP steganography due to the volume of VoIP traffic generated, which proved to be economically feasible to utilize. This paper discusses VoIP steganography challenges, compares the existing mechanisms, and proposes a new VoIP steganography approach. Current VoIP steganography… 

Figures and Tables from this paper

On importance of steganographic cost for network steganography
Steganographic cost can be an important characteristic that allows to express hidden data carrier degradation - similarly as MSE (Mean-Square Error) or PSNR (Peak Signal-to-Noise Ratio) are utilized for digital media steganography.
VoIP steganography and its Detection—A survey
This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.
Reliability enhancement and packet loss recovery of any steganographic method in voice over IP
This paper proposes a scheme which is capable of enhancing the reliability of any VoIP steganographic method, and implements the scheme on matrix embedding using binary Hamming codes steganography, which results in a reasonable reliability, a good speech quality and a very high Steganographic bandwidth.
MKIPS: MKI‐based protocol steganography method in SRTP
By intelligent utilization of the master key identifier field in the SRTP packet creation process, a covert channel is created and can convey a secret message without adding to the traffic overhead of the channel and packet loss in the destination.
A packet loss tolerant algorithm for information hiding in voice over IP
This paper proposes an algorithm that enables data hiding in G.711, the most commonly used voice codec for VoIP devices, while gracefully handling packet loss, and demonstrates that the algorithm performs well compared to other algorithms proposed in the literature in real world environments where packet loss is inevitable.
Using transcoding for hidden communication in IP telephony
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography), which aims to find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected.
Secure covert communications over streaming media using dynamic steganography
The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality, signal distortion, and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms.
Improvising Security Issues Using Quantum Cryptography
This paper has proposed use of quantum cryptography along with stegnography to create key distribution schemes that are uninterceptable thus providing data a perfect security.
RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network
This paper proposes an effective online steganalysis method to detect QIM steganography and finds four strong codeword correlation patterns in VoIP streams, which will be distorted after embedding with hidden data.
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression
Results indicate that steganographically modified VAD-activated VoIP streams offer a good trade-off between stealthiness and steganographic bandwidth.


Steganography of VoIP Streams
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
Fingerprinted secret sharing steganography for robustness against image cropping attacks
  • V. Potdar, S. Han, E. Chang
  • Computer Science
    INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005.
  • 2005
This paper proposes a conceptual framework for fingerprinted secret sharing steganography, a technique to break the main secret into multiple parts and hide them individually in a cover medium and uses the Lagrange interpolating polynomial method to recover the shared secret.
Secret image sharing with steganography and authentication
Exploring steganography: Seeing the unseen
It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Design and evaluation of steganography for voice-over-IP
It is shown that using this framework it is largely secure to transmit hidden messages during a VoIP session and demonstrate results with respect to perceptibility for music and speech data.
Hiding Data in the OSI Network Model
The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem.
A Reliable (k, n) Image Secret Sharing Scheme
  • Li Bai
  • Computer Science, Mathematics
    2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
  • 2006
This approach's advantages are its large compression rate on the size of the image shares, its strong protection of the secret image and its ability for the realtime processing.
Communication using phantoms: covert channels in the Internet
  • S. Servetto, M. Vetterli
  • Computer Science
    Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)
  • 2001
The main finding is that the use of inefficient codes to represent data that is intended to be used solely for network control operations (such as routing, sequencing, etc.), gives rise to the unintended creation of a covert channel.
How to share a secret
  • A. Shamir
  • Computer Science, Mathematics
  • 1979
This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Communication theory of secrecy systems
  • C. Shannon
  • Computer Science, Mathematics
    Bell Syst. Tech. J.
  • 1949
A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.