Steganography of VoIP Streams

Computer Science – Multimedia

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

18 pages, 9 figures, content changed, accepted to The 3rd International Symposium on Information Security (IS'08), Monterrey,

Scientific paper

The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols' fields and is known for IP, UDP or TCP protocols but has never been applied to RTP (Real-Time Transport Protocol) and RTCP (Real-Time Control Protocol) which are characteristic for VoIP. The second method, called LACK (Lost Audio Packets Steganography), provides hybrid storage-timing covert channel by utilizing delayed audio packets. The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Steganography of VoIP Streams does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Steganography of VoIP Streams, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Steganography of VoIP Streams will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-299272

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.