Visible to the public A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression

TitleA New Data-Hiding Approach for IP Telephony Applications with Silence Suppression
Publication TypeConference Paper
Year of Publication2017
AuthorsSchmidt, Sabine S., Mazurczyk, Wojciech, Keller, Jörg, Caviglione, Luca
Conference NameProceedings of the 12th International Conference on Availability, Reliability and Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5257-4
Keywordscomposability, covert channel, Information hiding, Metrics, privacy, pubcrawl, steganography, steganography detection, voice activity detection, VoIP
Abstract

Even if information hiding can be used for licit purposes, it is increasingly exploited by malware to exfiltrate data or to coordinate attacks in a stealthy manner. Therefore, investigating new methods for creating covert channels is fundamental to completely assess the security of the Internet. Since the popularity of the carrier plays a major role, this paper proposes to hide data within VoIP traffic. Specifically, we exploit Voice Activity Detection (VAD), which suspends the transmission during speech pauses to reduce bandwidth requirements. To create the covert channel, our method transforms a VAD-activated VoIP stream into a non-VAD one. Then, hidden information is injected into fake RTP packets generated during silence intervals. Results indicate that steganographically modified VAD-activated VoIP streams offer a good trade-off between stealthiness and steganographic bandwidth.

URLhttps://dl.acm.org/citation.cfm?doid=3098954.3106066
DOI10.1145/3098954.3106066
Citation Keyschmidt_new_2017