Skip to main content
Log in

LACK—a VoIP steganographic method

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’s impact on quality of voice transmission and its resistance to steganalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zander, S., Armitage, G., & Branch, P. (2007). A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys & Tutorials, 9(3), 44–57, ISSN: 1553-877X.

    Article  Google Scholar 

  2. Petitcolas, F., Anderson, R., & Kuhn, M. (1999). Information hiding—a survey. IEEE Special Issue on Protection of Multimedia Content, July 1999.

  3. Murdoch, S. J., & Lewis, S. (2005). Embedding covert channels into TCP/IP. In Proceedings of the workshop on information hiding (pp. 247–261).

  4. Szczypiorski, K. (2003). HICCUPS: Hidden communication system for corrupted networks. In Proc. of: ACS’2003, October 22–24, 2003 Międzyzdroje, Poland (pp. 31–40)

  5. Servetto, S. D., & Vetterli, M. (2001). Communication using phantoms: covert channels in the Internet. In Proc. of IEEE international symposium on information theory, June 2001.

  6. Birke, R., Mellia, M., Petracca, M., & Rossi, D. (2007). Understanding VoIP from backbone measurements. In 26th IEEE international conference on computer communications (INFOCOM 2007), 6–12 May 2007, pp. 2027–2035, ISBN 1-4244-1047-9.

  7. Choi, Y., Lee, J., Kim, T. G., & Lee, K. H. (2003). Efficient QoS scheme for voice traffic in converged LAN. In Proceedings of international symposium on performance evaluation of computer and telecommunication systems (SPECTS’03), July 20–24, 2003, Montreal, Canada.

  8. Miloucheva, I., Nassri, A., & Anzaloni, A. (2004). Automated analysis of network QoS parameters for voice over IP applications. In 2nd inter-domain performance and simulation workshop (IPS 2004).

  9. Bartoli, M., et al. (2001). Deliverable 19: Evaluation of Inter-Domain QoS modelling, simulation and optimization, INTERMON-IST-2001-34123. URL: http://www.ist-intermon.org/overview/im-wp5-v100-unibe-d19-pf.pdf.

  10. Schulzrinne, H., Casner, S., Frederick, R., & Jacobson, V. (2003). RTP: a transport protocol for real-time applications. IETF, RFC 3550, July 2003.

  11. Rosenberg, J., Schulzrinne, H., Camarillo, G., & Johnston, A. (2002). SIP: session initiation protocol, IETF, RFC 3261, June 2002.

  12. Cox, I., Kilian, J., Leighton, F., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.

    Article  Google Scholar 

  13. Chen, B., & Wornell, G. W. (2001). Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4), 1423–1443.

    Article  Google Scholar 

  14. Berk, V., Giani, A., & Cybenko, G. (2005). Detection of covert channel encoding in network packet delays. Tech. Rep. TR2005-536, Department of Computer Science, Dartmouth College, Nov. 2005. URL: http://www.ists.dartmouth.edu/library/149.pdf.

  15. Kundur, D., & Ahsan, K. (2003). Practical Internet steganography: data hiding in IP. In Proceedings of the Texas workshop on security of information systems, April 2003.

  16. Handley, M., Jacobson, V., & Perkins, C. (2006). SDP: session description protocol. IETF, RFC 4566, 2006.

  17. Friedman, T., Caceres, R., & Clark., A. (2003). RTP control protocol extended reports (RTCP XR), IETF RFC 3611, November 2003.

  18. ITU-T (2002). Recommendation G. 107, the E-model, a computational model for use in transmission planning.

  19. Hoßfeld, T., Tran-Gia, P., & Fiedler., M. (2007). Quantification of quality of experience for edge-based applications. In 20th international teletraffic congress (ITC20), Ottawa, Canada, Springer LNCS, Vol. 4516, pp. 361–373, June 2007

  20. Na, S., & Yoo., S. (2002). Allowable propagation delay for VoIP calls of acceptable quality. In Proc. of first international workshop, AISA 2002, Seoul, Korea, August 1–2, 2002, LNCS, Vol. 2402. Springer Berlin/Heidelberg, (pp. 469–480).

  21. ITU-T (1988). Recommendation, G.711: Pulse code modulation (PCM) of voice frequencies, November 1988.

  22. Fisk, G., Fisk, M., Papadopoulos, C., & Neil, J. (2002). Eliminating steganography in Internet traffic with active wardens. In 5th international workshop on information hiding. Lecture Notes in Computer Science, Vol. 2578, pp. 18–35.

  23. Mazurczyk, W., & Szczypiorski, K. (2008). Sposób steganograficznego ukrywania i przesyłania danych w sieci telekomunikacyjnej. Patent Application no. P-384940, 15 April 2008.

  24. Mazurczyk, W., & Szczypiorski, K. (2008). Steganography of VoIP streams. In R. Meersman, & Z. Tari (Eds.) Lecture Notes in Computer Science : Vol. 5332. OTM 2008, Part II. Berlin: Springer.

    Google Scholar 

  25. Mazurczyk, W., & Szczypiorski, K. (2008). Proc. of the 3rd international symposium on information security (IS’08), Monterrey, Mexico, November 10–11, 2008, pp. 1001–1018.

  26. ITU-T (1996). Recommendation. P.800. Methods for subjective determination of transmission quality.

  27. ITU-T (2001). Recommendation. P.862. Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs.

  28. Sieberg, D. (2001). Bin Laden exploits technology to suit his needs, CCN.com. URL: http://archives.cnn.com/2001/US/09/20/inv.terrorist.search/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wojciech Mazurczyk.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mazurczyk, W., Lubacz, J. LACK—a VoIP steganographic method. Telecommun Syst 45, 153–163 (2010). https://doi.org/10.1007/s11235-009-9245-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-009-9245-y

Navigation