2009
DOI: 10.1007/s11235-009-9245-y
|View full text |Cite
|
Sign up to set email alerts
|

LACK—a VoIP steganographic method

Abstract: Abstract. The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK's hidden data insertion procedure on the method's impact on quality of voice transmission and its resistance to steganalysis.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
39
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 59 publications
(40 citation statements)
references
References 16 publications
1
39
0
Order By: Relevance
“…Our proposed CTC technique shares the idea of utilizing timeouts with LACK, proposed in [6] and [7]. In LACK the contents of the late packet are modified and used as covert information carrier.…”
Section: Background On Utilizied Ctc Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…Our proposed CTC technique shares the idea of utilizing timeouts with LACK, proposed in [6] and [7]. In LACK the contents of the late packet are modified and used as covert information carrier.…”
Section: Background On Utilizied Ctc Algorithmsmentioning
confidence: 99%
“…While it has its origins in ancient times, it found a dramatic resurgence with the proliferation of the Internet. Several diverse methods of using exploiting this communication medium for hidden information exchange purposes are introduced and investigated in [1][2][3][4][5][6][7]. Based on the specific technique of how this covert communication is accomplished, it can be classified into three major categories.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…They discovered that a combination of information hiding solutions provides a capacity to covertly transfer about 2000 bits during the signalling phase of a connection and about 2.5 kbit/s during the conversation phase. In [31], a novel method called LACK (Lost Audio Packets Steganography) was introduced; it was later described and analysed in [29] and [26]. LACK relies on the modification of both: the content of the RTP packets, and their time dependencies.…”
Section: Related Workmentioning
confidence: 99%
“…for case of dependence of IR(t) on E(D|D>t) it is (4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19)(20) where p E(D) and p E(D|D>t) denote LACK packet loss probability for both of above cases respectively. That is why call quality "gain" equals …”
Section: Dependence Of Ir(t) On Steganogram Size Under Limitation Ir(mentioning
confidence: 99%