Skip to main content

Steganography in Streaming Multimedia over Networks

  • Conference paper
Transactions on Data Hiding and Multimedia Security VII

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 7110))

  • 516 Accesses

Abstract

This paper presents steganography methods to covertly transmit data via RTP (Real-time Transport Protocol) header and RTP payload in multimedia streaming over networks. The proposed covert channels do not change the original traffic pattern. The bandwidth and the impact of the proposed covert channels on the received video quality are analyzed. Steganalysis of the proposed hiding methods is also discussed and the proposed covert channels cannot be detected by traffic pattern, received video quality, or the statistical property required by the standard. Simulations on real video traces and RTP packets collected from multicasting videos to LAN (Local Area Network) are conducted and the results show the proposed covert channels not only achieve relatively high bandwidth but also keep the received video quality high or unchanged. Those features make the proposed covert channels practical and not easy to be detected.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Szczypiorski, K.: Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System HICCUPS. Institute of Telecommunications Seminar (2003)

    Google Scholar 

  2. Lioyd, P.: An exploration of Covert Channels witin Voice Over IP. Dept. of Computing and Information Sciences, Thesis, Rochester Institute of Technology (2010), http://www.tele.pw.edu.pl/~krzysiek/pdf/steg-seminar-2003.pdf (retrieved June 17, 2010)

  3. Zander, S., Armitage, Z., Branch, P.: A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys 9(3), 44–57, 3rd quarter (2007)

    Google Scholar 

  4. Forte, D.V., Maruti, C., Vetturi, M.R., Zambelli, Z.: SecSyslog: An Approach to Secure Logging Based on Covert Channels. In: Proc. First Intl. Wksp. Systematic Approaches to Digital Forensic Engineering, pp. 248–263 (November 2005)

    Google Scholar 

  5. de Graff, R., Aycock, J., Jacobson., M.: Improved Port Knocking with Strong Authentication. In: Proc. 21st Annual Computer Security Applications Conf., pp. 451–462 (December 2005)

    Google Scholar 

  6. I)ruid: Real Time Steganography with RTP, http://druid.caughq.org/presentations/Real-time-Steganography-with-RTP.pdf

  7. Mazurczyk, W., Szczpiorski, K.: Covert Channels in SIP for VoIP Signalling. Warsaw University of Technology (2008)

    Google Scholar 

  8. Mazurczyk, W., Lubacz, J.: LACK– a VoIP Steganographic Method. Journal of Telecommunication System (December 2009)

    Google Scholar 

  9. Packard, H.: MPEG-2: The Basics of How It Works, http://www.home.agilent.com/upload/cmc_upload/All/6C06MPEGTUTORIAL1.pdf

  10. Hoffman, D., Fernando, G., Goyal, V., Civanlar, M.: RFC2250-RTP Payload Format for MPEG1/MPEG2 Video. IETF RFC2250

    Google Scholar 

  11. MacAulay, A., Felts, B., Fisher, Y.: IP Streaming of MPEG-4: Native RTP vs MPEG-2 Transport Stream. white paper, Envivo, Inc. (2005)

    Google Scholar 

  12. LIamas, D., Allison, C., Miller, A.: Covert Channels in Internet Protocols: A Survey (2005), http://gray-world.net/papers/0506-PGNET-Paper.pdf.

  13. Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP Streams. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol. 5332, pp. 1001–1018. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  14. Giffin, J., Greenstadt, R., Litwack, P., Tibbetts, R.: Covert Messaging through TCP Timestamps. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 194–208. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Schulzrine, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-time Applications. RFC3550

    Google Scholar 

  16. Jeffay, K.: The Multimedia Transport Protocol RTP. University of North Carolina at Chapel Hill (1999), http://www.home.elka.pw.edu.pl/~wmazurcz/moja/art/Eglobal_sip_covert.pdf

  17. Lucena, N.B., Pease, J., Yadollahpour, P., Chapin, S.J.: Syntax and Semantics-Preserving Application-Layer Protocol Steganography. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 164–179. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Seeling, P.: Video Traces for Network Performance Analysis, http://trace.eas.asu.edu/mpeg2

  19. Software WireShark, http://www.wireshark.org

  20. Zhao, H., Shi, Y.Q., Ansari, N.: Hiding Data in Multimedia Streaming over Networks. In: CNSR (8th Communication Networks and Services Research), May 11-14, pp. 50–55 (2010)

    Google Scholar 

  21. Cabuk, S., Brodley, C.E., Shields, C.: IP Covert Channel Detection. ACM Trans. on Information and Systems Security 12(4) (April 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhao, H., Shi, Y.Q., Ansari, N. (2012). Steganography in Streaming Multimedia over Networks. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security VII. Lecture Notes in Computer Science, vol 7110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28693-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28693-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28692-6

  • Online ISBN: 978-3-642-28693-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics