Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic methods are usually aimed at hiding the very existence of the communication. Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect carrier for steganographic purposes. This paper is a first survey of the existing VoIP steganography methods and their countermeasures. include circumvention of web censorship and surveillance, computer/network forensics, or copyright protection. Techniques can be used with VoIP to improve its resistance to packet losses and improve voice quality [Aoki 2003;2004], extend communication bandwidth [Aoki 2007] or provide means for secure cryptographic key distribution [Huang et al. 2011a].The expansion of TCP/IP networks opened up many possibilities for covert communication due to changes in the traditional circuit-switched networks paradigm; services/applications are created by the network users rather than by the network itself, the transport and control functions are not separated and can be