2011 Fifth International Conference on Secure Software Integration and Reliability Improvement 2011
DOI: 10.1109/ssiri.2011.24
|View full text |Cite
|
Sign up to set email alerts
|

ReLACK: A Reliable VoIP Steganography Approach

Abstract: VoIP steganography is a real-time network steganography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret messages. Recently, there has been a noticeable increase in the interest in VoIP steganography due to the volume of VoIP traffic generated, which proved to be economically feasible to utilize. This paper discusses VoIP steganography challenges, compares the existing mechanisms, and proposes a new VoIP steganography approach. Current VoIP steganography techniques lack mechanis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…The following table summarises most important characteristics of the steganographic methods outlined in subsection 3.2. --+ + + + Hamdaqa and Tahvildari [2011], --+ + --…”
Section: Hybrid Methods (S3)mentioning
confidence: 99%
“…The following table summarises most important characteristics of the steganographic methods outlined in subsection 3.2. --+ + + + Hamdaqa and Tahvildari [2011], --+ + --…”
Section: Hybrid Methods (S3)mentioning
confidence: 99%
“…Additionally, an additional control protocol in a hidden channel can be applied to provide increased reliability (it is sometimes called a microprotocol). One solution is to use an approach proposed by Hamdaqa and Tahvildari [8], as it can be easily incorporated into the proposed method. It provides a reliable and fault-tolerant mechanism based on a modified (k, n) threshold of a Lagrange Interpolation, and the results demonstrated by that paper prove that the complexity of the steganalysis is increased.…”
Section: Secret Data Transmitting Sidementioning
confidence: 99%
“…It considers the signal processing vulnerabilities of substitution technique based spatial steganography [12] and establishes its resilience towards them. It also responses positively to the lagrange's interpolation [14] based steganalysis The algorithm considers the effective steganalysis methods of estimating secret key in sequential embedding methods through low, medium, and high signal-to-noise ratio (SNR) analysis and abrupt change detection based steganalysis [13]. The abrupt change detection using sequential probability ratio test (SPRT) has also been applied against this algorithm as shows inarguably positive statistics.…”
Section: Comparative Analysis Of the State Of The Art Work And Resilmentioning
confidence: 99%