2015
DOI: 10.1007/s11042-015-2740-0
|View full text |Cite
|
Sign up to set email alerts
|

YouSkyde: information hiding for Skype video traffic

Abstract: In this paper a new information hiding method for Skype videoconference calls -YouSkyde -is introduced. A Skype traffic analysis revealed that introducing intentional losses into the Skype video traffic stream to provide the means for clandestine communication is the most favourable solution. A YouSkyde proof-ofconcept implementation was carried out and its experimental evaluation is presented. The results obtained prove that the proposed method is feasible and offer a steganographic bandwidth as high as 0.93 … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 16 publications
(25 reference statements)
0
3
0
Order By: Relevance
“…The Adaptive Steganography method utilizes the Human Visual System (HVS) [16]. HVS aims to protect data within pixels less noticeable to humans [17].…”
Section: Steganographic File Structure Exploits Programmaticallymentioning
confidence: 99%
“…The Adaptive Steganography method utilizes the Human Visual System (HVS) [16]. HVS aims to protect data within pixels less noticeable to humans [17].…”
Section: Steganographic File Structure Exploits Programmaticallymentioning
confidence: 99%
“…As other image formats, this reads as a continuous data stream pixel-based file, and it has support for transparency, animation features. Allowing 8-bit colour indexing only, which is in practice 256 distinct shades compared to the 16.777.216 possibilities, it has limitations [11]. As per its limitations, the capacity for hiding data is significantly smaller than the BMP format.…”
Section: A Graphics Interchange Formatmentioning
confidence: 99%
“…Correspondingly, the rival destroys the storage channel through data rewriting or normalization [13], [18]. For VoIP and other applications, the packet transmission frequency is high, and the covert channel based on storage content is also of high performance [19], [20]. Combined with steganography and other data embedding methods, the CSC also has good effect on video and multimedia applications [20], [21] Different from the CSC, the covert timing channel (CTC) is designed on fine tuning of the characteristics of packet transmission and does not change the data content.…”
Section: Introductionmentioning
confidence: 99%