On steganography in lost audio packets

This paper presents a new hidden data insertion procedure based on the estimated probability of the remaining time of the call for the steganographic method called lost audio packets (LACK) steganography. LACK provides hidden communication for real-time services such as voice over IP. The analytical results presented in this paper concern the influence of LACK's hidden data insertion procedures on the quality of voice transmission and the resistance to steganalysis. The proposed hidden data insertion procedure is also compared with previous steganogram insertion approaches on the basis of estimating the remaining average call duration. Copyright © 2011 John Wiley & Sons, Ltd.

[1]  Wojciech Mazurczyk,et al.  LACK—a VoIP steganographic method , 2008, Telecommun. Syst..

[2]  H. Schulzrinne,et al.  A Transport Protocol for Real-time Applications , 2010 .

[3]  METHODS FOR SUBJECTIVE DETERMINATION OF TRANSMISSION QUALITY Summary , 2022 .

[4]  Yan Zhang,et al.  Handbook of Research on Secure Multimedia Distribution , 2009 .

[5]  Wojciech Mazurczyk,et al.  Steganography of VoIP Streams , 2008, OTM Conferences.

[6]  Methods for objective and subjective assessment of quality Perceptual evaluation of speech quality ( PESQ ) : An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs , 2002 .

[7]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[8]  I. Miloucheva,et al.  Automated analysis of network QoS parameters for Voice over IP applications , 2004 .

[9]  Wojciech Mazurczyk,et al.  Analysis of a procedure for inserting steganographic data into VoIP calls , 2008, ArXiv.

[10]  Seungwha Yoo,et al.  Allowable Propagation Delay for VoIP Calls of Acceptable Quality , 2002, AISA.

[11]  Markus Fiedler,et al.  Quantification of Quality of Experience for Edge-Based Applications , 2007, ITC.

[12]  Dario Rossi,et al.  Understanding VoIP from Backbone Measurements , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[13]  Mike Fisk,et al.  Eliminating Steganography in Internet Traffic with Active Wardens , 2002, Information Hiding.

[14]  Ramón Cáceres,et al.  RTP Control Protocol Extended Reports (RTCP XR) , 2003, RFC.