Abstract
This paper presents steganography methods to covertly transmit data via RTP (Real-time Transport Protocol) header and RTP payload in multimedia streaming over networks. The proposed covert channels do not change the original traffic pattern. The bandwidth and the impact of the proposed covert channels on the received video quality are analyzed. Steganalysis of the proposed hiding methods is also discussed and the proposed covert channels cannot be detected by traffic pattern, received video quality, or the statistical property required by the standard. Simulations on real video traces and RTP packets collected from multicasting videos to LAN (Local Area Network) are conducted and the results show the proposed covert channels not only achieve relatively high bandwidth but also keep the received video quality high or unchanged. Those features make the proposed covert channels practical and not easy to be detected.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Szczypiorski, K.: Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System HICCUPS. Institute of Telecommunications Seminar (2003)
Lioyd, P.: An exploration of Covert Channels witin Voice Over IP. Dept. of Computing and Information Sciences, Thesis, Rochester Institute of Technology (2010), http://www.tele.pw.edu.pl/~krzysiek/pdf/steg-seminar-2003.pdf (retrieved June 17, 2010)
Zander, S., Armitage, Z., Branch, P.: A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys 9(3), 44–57, 3rd quarter (2007)
Forte, D.V., Maruti, C., Vetturi, M.R., Zambelli, Z.: SecSyslog: An Approach to Secure Logging Based on Covert Channels. In: Proc. First Intl. Wksp. Systematic Approaches to Digital Forensic Engineering, pp. 248–263 (November 2005)
de Graff, R., Aycock, J., Jacobson., M.: Improved Port Knocking with Strong Authentication. In: Proc. 21st Annual Computer Security Applications Conf., pp. 451–462 (December 2005)
I)ruid: Real Time Steganography with RTP, http://druid.caughq.org/presentations/Real-time-Steganography-with-RTP.pdf
Mazurczyk, W., Szczpiorski, K.: Covert Channels in SIP for VoIP Signalling. Warsaw University of Technology (2008)
Mazurczyk, W., Lubacz, J.: LACK– a VoIP Steganographic Method. Journal of Telecommunication System (December 2009)
Packard, H.: MPEG-2: The Basics of How It Works, http://www.home.agilent.com/upload/cmc_upload/All/6C06MPEGTUTORIAL1.pdf
Hoffman, D., Fernando, G., Goyal, V., Civanlar, M.: RFC2250-RTP Payload Format for MPEG1/MPEG2 Video. IETF RFC2250
MacAulay, A., Felts, B., Fisher, Y.: IP Streaming of MPEG-4: Native RTP vs MPEG-2 Transport Stream. white paper, Envivo, Inc. (2005)
LIamas, D., Allison, C., Miller, A.: Covert Channels in Internet Protocols: A Survey (2005), http://gray-world.net/papers/0506-PGNET-Paper.pdf.
Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP Streams. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol. 5332, pp. 1001–1018. Springer, Heidelberg (2008)
Giffin, J., Greenstadt, R., Litwack, P., Tibbetts, R.: Covert Messaging through TCP Timestamps. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 194–208. Springer, Heidelberg (2003)
Schulzrine, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-time Applications. RFC3550
Jeffay, K.: The Multimedia Transport Protocol RTP. University of North Carolina at Chapel Hill (1999), http://www.home.elka.pw.edu.pl/~wmazurcz/moja/art/Eglobal_sip_covert.pdf
Lucena, N.B., Pease, J., Yadollahpour, P., Chapin, S.J.: Syntax and Semantics-Preserving Application-Layer Protocol Steganography. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 164–179. Springer, Heidelberg (2004)
Seeling, P.: Video Traces for Network Performance Analysis, http://trace.eas.asu.edu/mpeg2
Software WireShark, http://www.wireshark.org
Zhao, H., Shi, Y.Q., Ansari, N.: Hiding Data in Multimedia Streaming over Networks. In: CNSR (8th Communication Networks and Services Research), May 11-14, pp. 50–55 (2010)
Cabuk, S., Brodley, C.E., Shields, C.: IP Covert Channel Detection. ACM Trans. on Information and Systems Security 12(4) (April 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhao, H., Shi, Y.Q., Ansari, N. (2012). Steganography in Streaming Multimedia over Networks. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security VII. Lecture Notes in Computer Science, vol 7110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28693-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-28693-3_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28692-6
Online ISBN: 978-3-642-28693-3
eBook Packages: Computer ScienceComputer Science (R0)