SkyDe: a Skype-based Steganographic Method

  title={SkyDe: a Skype-based Steganographic Method},
  author={Wojciech Mazurczyk and Maciej Karas and Krzysztof Szczypiorski},
  journal={Int. J. Comput. Commun. Control},
This paper introduces SkyDe (Skype Hide), a new steganographic method that utilizes Skype encrypted packets with silence to provide the means for clandestine communication. It is possible to reuse packets that do not carry voice signals for steganographic purposes because Skype does not use any silence suppression mechanism. The method's proof-of-concept implementation and first experimental results are presented. They prove that the method is feasible and offers steganographic bandwidth as… 

Figures and Tables from this paper

YouSkyde: information hiding for Skype video traffic
The results obtained prove that the proposed YouSkyde method for Skype videoconference calls is feasible and offer a steganographic bandwidth as high as 0.93 kbps, while introducing negligible distortions into transmission quality and providing high undetectability.
Audio steganografie a IP telefonie
This work proposes, describes and implements a steganography method by which to send the secret message during the Skype call, and increases the robustness of this method by error-correcting and self-synchronising codes.
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression
Results indicate that steganographically modified VAD-activated VoIP streams offer a good trade-off between stealthiness and steganographic bandwidth.
Broadcast Steganography
The introduction of a new variant of anonymous broadcast encryption that is outsider-anonymous broadcast encryption with pseudorandom ciphertexts (oABE) is introduced, which achieves sublinear ciphertext size and is secure in the standard model against adaptive adversaries with sublinear communication complexity.
A Simple Network Steganography Method based on the IPDs’ Frequency Characteristic
A new network steganography method based on the IPDs’ frequency characteristic is proposed in this paper to increase its robustness while maintaining the security and the experimental results show that the scheme has stronger robustness and better invisibility than the existing methods.
SkyLen: a Skype-based length covert channel
A Skype-based length covert channel SkyLen is proposed, based on the popular software Skype, and the detection experiments show that the proposed method is much stealthier than the existing one.
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
The issues related to countering network steganography in practice are discussed, an outlook on further research directions and problems are provided and its potential application for harmful purposes is highlighted.
A DWT-Based Covert Timing Channel of High Concealment
A DWT-based covert timing channel is proposed to improve concealment, where secret information is modulated into the wavelet coefficients of normal inter-packet delays (IPD).


VoIP steganography and its Detection—A survey
This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.
ReLACK: A Reliable VoIP Steganography Approach
  • Mohammad Hamdaqa, L. Tahvildari
  • Computer Science
    2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
  • 2011
This paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange's Interpolation, and applies a two phase approach on the LACK steganography mechanism to provide reliability and fault tolerance and to increase steganalysis complexity.
Steganography of VoIP Streams
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
On the identification and analysis of Skype traffic
Novel algorithms to detect several types of communications (including voice calls primarily) that the Skype client initiates toward dedicated servers of the Skype network and other peers are introduced.
Revealing skype traffic: when randomness plays with you
This paper proposes a framework based on two complementary techniques to reveal Skype traffic in real time, exploiting the randomness introduced at the bit level by the encryption process to identify Skype traffic.
Vice over IP
What kind of potential contemporary communication networks have for enabling steganography, and in effect, create new techniques so that researchers can figure out how to thwart them.
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec
It is revealed that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the streams; that is, steganography in the inactive audio frames attains a largerData embedding capacity than that in the active audio frames under the same imperceptibility.
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
Results indicate that a passive observer can identify phrases from a standard speech corpus within encrypted calls with an average accuracy of 50%, and with accuracy greater than 90% for some phrases, calling into question the efficacy of current VoIP encryption standards.
Inferring Speech Activity from Encrypted Skype Traffic
This paper proposes the first real-time network-level VAD algorithm that can extract voice activity from encrypted and non-silence-suppressed Skype traffic and evaluates the speech detection accuracy of the proposed algorithm with extensive real-life traces.
Tracking Down Skype Traffic
This paper study and characterize Skype traffic based on extensive passive measurements collected from the authors' campus LAN, leveraging on the use of an accurate Skype classification engine that recently proposed.