Steganography of VoIP Streams

@inproceedings{Mazurczyk2008SteganographyOV,
  title={Steganography of VoIP Streams},
  author={Wojciech Mazurczyk and Krzysztof Szczypiorski},
  booktitle={OTM Conferences},
  year={2008}
}
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. [] Key Method The first one is network steganography solution which exploits free/unused protocols' fields and is known for IP, UDP or TCP protocols but has never been applied to RTP (Real-Time Transport Protocol) and RTCP (Real-Time Control Protocol) which are characteristic for VoIP.
Steganography in Streaming Multimedia over Networks
TLDR
Steganography methods to covertly transmit data via RTP header and RTP payload in multimedia streaming over networks not only achieve relatively high bandwidth but also keep the received video quality high or unchanged, which makes the proposed covert channels practical and not easy to be detected.
Lost audio packets steganography: the first practical evaluation
TLDR
First experimental results for an Internet Protocol (IP) telephony-based steganographic method called lost audio packets steganography (LACK) are presented and the method’s impact on the quality of voice transmission is shown.
What are suspicious VoIP delays?
Voice over IP (VoIP) is unquestionably the most popular real-time service in IP networks today. Recent studies have shown that it is also a suitable carrier for information hiding. Hidden
ReLACK: A Reliable VoIP Steganography Approach
  • Mohammad Hamdaqa, L. Tahvildari
  • Computer Science
    2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
  • 2011
TLDR
This paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange's Interpolation, and applies a two phase approach on the LACK steganography mechanism to provide reliability and fault tolerance and to increase steganalysis complexity.
Adaptive VoIP Steganography for Information Hiding within Network Audio Streams
TLDR
This paper proposes AVIS, a novel Adaptive VoIP steganography approach to hide information within Network Audio Streams, which works by dynamically select multiple bits based on the VoIP vector value to avoid detection and attacking.
A Model for the Effective Steganalysis of VoIP
TLDR
This work proposes an effective steganalysis method which considers the speech behavior as well as network protocol structure to detect hidden communication in voice over IP (VoIP).
ANewHybridMethod for VoIP Stream Steganography
TLDR
The experimental results show that LASB is superior to both LACK and LSB in many aspects, as well as being more robust because of diversifying the source of data embedding.
Hiding Data in VoIP
TLDR
A classification of network steganography methods is proposed, which enables manipulating certain properties of the communications medium in an unexpected, unconventional, or unforeseen way to hide secret data in users' normal data transmissions.
Creating Covert Channel Using SIP
TLDR
The main aim of this paper is to calculate the maximum number and type of SIP messages that can be transferred during established VoIP call without detection and raising an alarm from IDS (Intrusion detection system).
...
...

References

SHOWING 1-10 OF 31 REFERENCES
Covert Channels in SIP for VoIP signalling
TLDR
Evaluating available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call provides new insights by introducing new techniques.
New security and control protocol for VoIP based on steganography and digital watermarking
TLDR
A new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented, based on two information hiding techniques: digital watermarking and steganography and it is capable of exchanging and verifying QoS and security parameters.
Practical Data Hiding in TCP/IP
TLDR
By passing supplementary information through IPv4 headers it is demonstrated how security mechanisms can be enhanced in routers, firewalls, and for services such as authentication, audit and logging without considerable additions to software or hardware.
Eliminating Steganography in Internet Traffic with Active Wardens
TLDR
This paper examines the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall, and introduces the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications.
New VoIP Traffic Security Scheme with Digital Watermarking
TLDR
A new, lightweight, no bandwidth consuming authentication and integrity scheme for VoIP service based on SIP as a signalling protocol that can greatly improve, if it is combined with existing security mechanisms, overall IP Telephony system's security.
Embedding Covert Channels into TCP/IP
TLDR
By examining TCP/IP specifications and open source implementations, tests to detect the use of naive embedding are developed and reversible transforms that map block cipher output onto TCP ISNs are described, indistinguishable from those generated by Linux and OpenBSD.
A survey of covert channels and countermeasures in computer network protocols
TLDR
A survey of the existing techniques for creating covert channels in widely deployed network and application protocols and an overview of common methods for their detection, elimination, and capacity limitation, required to improve security in future computer networks are given.
Application layer covert channel analysis and detection.
TLDR
This dissertation investigated Internet protocol stack and identified Application Layer as the level most vulnerable to covert channel operations and identified HTTP as the protocol which must fully understand HTTP protocol, recognise signatures of different HTTP implementations and be capable of anomaly analysis.
Communication using phantoms: covert channels in the Internet
  • S. Servetto, M. Vetterli
  • Computer Science
    Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)
  • 2001
TLDR
The main finding is that the use of inefficient codes to represent data that is intended to be used solely for network control operations (such as routing, sequencing, etc.), gives rise to the unintended creation of a covert channel.
HICCUPS : Hidden Communication System for Corrupted Networks
TLDR
All functional parts of the HICCUPS (HIdden Communication system for CorrUPted networkS), a steganographic system dedicated to shared medium networks including wireless local area networks, are discussed.
...
...