2010
DOI: 10.1109/mspec.2010.5397787
|View full text |Cite
|
Sign up to set email alerts
|

Vice over IP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
28
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
6
2
1

Relationship

5
4

Authors

Journals

citations
Cited by 36 publications
(28 citation statements)
references
References 0 publications
0
28
0
Order By: Relevance
“…The other encodes secret messages by varying packet rates, which is equivalent to modulating the inter-packet times. In the VoIP scenario, the former has been popularly implemented in IP [4,22,23], RTP/RTCP [22,24,25,26] and SIP with SDP [27]. In contrast, the application of the latter is comparatively rare, possibly considering the QoS (Quality of Service) of VoIP.…”
Section: Related Workmentioning
confidence: 99%
“…The other encodes secret messages by varying packet rates, which is equivalent to modulating the inter-packet times. In the VoIP scenario, the former has been popularly implemented in IP [4,22,23], RTP/RTCP [22,24,25,26] and SIP with SDP [27]. In contrast, the application of the latter is comparatively rare, possibly considering the QoS (Quality of Service) of VoIP.…”
Section: Related Workmentioning
confidence: 99%
“…They discovered that a combination of information hiding solutions provides a capacity to covertly transfer about 2000 bits during the signaling phase of a connection and about 2.5 kbit/s during the conversation phase. In [25], a novel method called lost audio packets steganography (LACK) was introduced; it was later described and analyzed in [23] and [21]. LACK relies on the modification of both the content of the RTP packets and their time dependencies.…”
Section: Related Workmentioning
confidence: 99%
“…They discovered that a combination of information hiding solutions provides a capacity to covertly transfer about 2000 bits during the signalling phase of a connection and about 2.5 kbit/s during the conversation phase. In [31], a novel method called LACK (Lost Audio Packets Steganography) was introduced; it was later described and analysed in [29] and [26]. LACK relies on the modification of both: the content of the RTP packets, and their time dependencies.…”
Section: Related Workmentioning
confidence: 99%
“…Network steganography, to perform hidden communication, utilizes network protocols and/or relationships between them as the carrier for steganograms. Because of its popularity, IP telephony is becoming a natural target for network steganography [26]. Steganographic methods are aimed at hiding of the very existence of the communication, therefore any third-party observers should remain unaware of the presence of the steganographic exchange [40].…”
mentioning
confidence: 99%