Hiding Data in VoIP
WARSAW TECHNICAL UNIV (POLAND)
Pagination or Media Count:
The paper presents and compares steganographic techniques that can be used to enable hidden communication within computer networks. A new class steganophony of such methods is introduced. Specific methods proposed by the authors - LACK, HICCUPS and SIP-based VoIP protocols steganography - are briefly described. The main aim of network steganography is to hide secret data in users normal data transmissions, ideally, so it cannot be detected by third parties. One of the most popular steganographic techniques is to use a covert channel, which enables manipulating certain properties of the communications medium in an unexpected, unconventional, or unforeseen way. In the past few years the interest in steganographic methods that may be used in computer networks has grown considerably, mostly due to presumed usage of hidden communication by terrorists. Many new methods have been proposed and analyzed also in meaning of translation among heterogeneous environments. In this paper we propose a classification of network steganography methods.
- Computer Programming and Software
- Military Operations, Strategy and Tactics
- Radio Countermeasures
- Radio Communications