Abstract
The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’s impact on quality of voice transmission and its resistance to steganalysis.
Similar content being viewed by others
References
Zander, S., Armitage, G., & Branch, P. (2007). A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys & Tutorials, 9(3), 44–57, ISSN: 1553-877X.
Petitcolas, F., Anderson, R., & Kuhn, M. (1999). Information hiding—a survey. IEEE Special Issue on Protection of Multimedia Content, July 1999.
Murdoch, S. J., & Lewis, S. (2005). Embedding covert channels into TCP/IP. In Proceedings of the workshop on information hiding (pp. 247–261).
Szczypiorski, K. (2003). HICCUPS: Hidden communication system for corrupted networks. In Proc. of: ACS’2003, October 22–24, 2003 Międzyzdroje, Poland (pp. 31–40)
Servetto, S. D., & Vetterli, M. (2001). Communication using phantoms: covert channels in the Internet. In Proc. of IEEE international symposium on information theory, June 2001.
Birke, R., Mellia, M., Petracca, M., & Rossi, D. (2007). Understanding VoIP from backbone measurements. In 26th IEEE international conference on computer communications (INFOCOM 2007), 6–12 May 2007, pp. 2027–2035, ISBN 1-4244-1047-9.
Choi, Y., Lee, J., Kim, T. G., & Lee, K. H. (2003). Efficient QoS scheme for voice traffic in converged LAN. In Proceedings of international symposium on performance evaluation of computer and telecommunication systems (SPECTS’03), July 20–24, 2003, Montreal, Canada.
Miloucheva, I., Nassri, A., & Anzaloni, A. (2004). Automated analysis of network QoS parameters for voice over IP applications. In 2nd inter-domain performance and simulation workshop (IPS 2004).
Bartoli, M., et al. (2001). Deliverable 19: Evaluation of Inter-Domain QoS modelling, simulation and optimization, INTERMON-IST-2001-34123. URL: http://www.ist-intermon.org/overview/im-wp5-v100-unibe-d19-pf.pdf.
Schulzrinne, H., Casner, S., Frederick, R., & Jacobson, V. (2003). RTP: a transport protocol for real-time applications. IETF, RFC 3550, July 2003.
Rosenberg, J., Schulzrinne, H., Camarillo, G., & Johnston, A. (2002). SIP: session initiation protocol, IETF, RFC 3261, June 2002.
Cox, I., Kilian, J., Leighton, F., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.
Chen, B., & Wornell, G. W. (2001). Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4), 1423–1443.
Berk, V., Giani, A., & Cybenko, G. (2005). Detection of covert channel encoding in network packet delays. Tech. Rep. TR2005-536, Department of Computer Science, Dartmouth College, Nov. 2005. URL: http://www.ists.dartmouth.edu/library/149.pdf.
Kundur, D., & Ahsan, K. (2003). Practical Internet steganography: data hiding in IP. In Proceedings of the Texas workshop on security of information systems, April 2003.
Handley, M., Jacobson, V., & Perkins, C. (2006). SDP: session description protocol. IETF, RFC 4566, 2006.
Friedman, T., Caceres, R., & Clark., A. (2003). RTP control protocol extended reports (RTCP XR), IETF RFC 3611, November 2003.
ITU-T (2002). Recommendation G. 107, the E-model, a computational model for use in transmission planning.
Hoßfeld, T., Tran-Gia, P., & Fiedler., M. (2007). Quantification of quality of experience for edge-based applications. In 20th international teletraffic congress (ITC20), Ottawa, Canada, Springer LNCS, Vol. 4516, pp. 361–373, June 2007
Na, S., & Yoo., S. (2002). Allowable propagation delay for VoIP calls of acceptable quality. In Proc. of first international workshop, AISA 2002, Seoul, Korea, August 1–2, 2002, LNCS, Vol. 2402. Springer Berlin/Heidelberg, (pp. 469–480).
ITU-T (1988). Recommendation, G.711: Pulse code modulation (PCM) of voice frequencies, November 1988.
Fisk, G., Fisk, M., Papadopoulos, C., & Neil, J. (2002). Eliminating steganography in Internet traffic with active wardens. In 5th international workshop on information hiding. Lecture Notes in Computer Science, Vol. 2578, pp. 18–35.
Mazurczyk, W., & Szczypiorski, K. (2008). Sposób steganograficznego ukrywania i przesyłania danych w sieci telekomunikacyjnej. Patent Application no. P-384940, 15 April 2008.
Mazurczyk, W., & Szczypiorski, K. (2008). Steganography of VoIP streams. In R. Meersman, & Z. Tari (Eds.) Lecture Notes in Computer Science : Vol. 5332. OTM 2008, Part II. Berlin: Springer.
Mazurczyk, W., & Szczypiorski, K. (2008). Proc. of the 3rd international symposium on information security (IS’08), Monterrey, Mexico, November 10–11, 2008, pp. 1001–1018.
ITU-T (1996). Recommendation. P.800. Methods for subjective determination of transmission quality.
ITU-T (2001). Recommendation. P.862. Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs.
Sieberg, D. (2001). Bin Laden exploits technology to suit his needs, CCN.com. URL: http://archives.cnn.com/2001/US/09/20/inv.terrorist.search/.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mazurczyk, W., Lubacz, J. LACK—a VoIP steganographic method. Telecommun Syst 45, 153–163 (2010). https://doi.org/10.1007/s11235-009-9245-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-009-9245-y