VoIP Steganography, Applications and Challenges

Document Type : Original Article


1 Assistant Professor,, ICT, Imam Hussein Comprehensive University

2 Masters student, ICT, Imam Hussein Comprehensive University


Steganography on the VoIP Platform is a Real-time network Steganography Method, It uses VoIP Protocols as a cover channel to hide messages. At the moment, real-time steganography is one of the challenging research areas. The reason for this is the inherent characteristics of the transfer of information in real time, which limits the complexity of operations. In this paper, we first describe the definition of Steganography and describe the VoIP concept briefly, and then we will describe some of the work done in this field. In continuation, we express the way VoIP works and the problems that we face, and then we consider the concept of VoIP Steganography and describe its challenges. Finally, introduce some of the most widely used methods of VoIP Steganography, and then we compare the different ways of VoIP steganography with each other, and discuss the weaknesses and strengths of each of them. In the final section of this paper, we will give the research results.





    1. A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp.    727-752, 2010.##
    2. N. Aoki, “A packet loss concealment technique for VoIP using steganography,” In Proc. Of International Symposium on Intelligent Signal Processing and Communication System ISPACS 2003, Awaji Island, Japan, pp. 470-473, December 7-10, 2003.##
    3. Z.Wu and W.Yang , “G. 711-based adaptive speech information hiding approach,” ICIC 2006, LNCS4113, pp. 1139-1144, 2006.##
    4. H. Tian, H. Jiang, K. Zhou, and D. Feng, “Adaptive partial-matching steganography for voice over IP using triple M sequences,” Computer Communications journal, vol. 34, pp. 2236-2247, 2011.##
    5. W. Mazurczyk and Z. Kotulski, “New VoIP traffic security scheme with digital watermarking,” In Proc. of25-th International Conference on Computer Safety, Reliability, and Security SafeComp 2006, LectureNotes in Computer Science 4166, pp. 170-181, 2006.##  
    6. W. Mazurczyk and Z. Kotulski, “New security and control protocol for VoIP based on steganography and digital watermarking,” In: Proc 5th Int Conf Computer Science-research and applications (IBIZA2006), Poland, Kazimierz Dolny, 2006.##
    7. F. Li, B. Li, L. Peng, W. Chen, L. Zheng, and K. Xu, “A Steganographic Method Based on High Bit Rates Speech Codec of G. 723.1,” Springer, pp. 312-322, 2018.##
    8. S. Schmidt, W. Mazurczyk, R. Kulesza, J. Keller, and L. Caviglione, “Exploiting IP telephony with silence suppression for hidden data transfers,” Computers Security, vol. 79, pp. 17-32, 2018.##
    9. Sh. AbdelRahim, S. Ghoneimy, and G. Selim, “Adaptive security scheme for real-time VoIP using multi-layer steganography,” Proceedings of the 7th International Conference on Software and Information Engineering, pp. 106-110, 2018.##
    10. اصفهانی، پ، ذوالفقاری­نژاد، م، کرمی، پ، ارائه یک روش نهان­نگاری جدید و قابل اعتماد از طریق VoIP، شانزدهمین کنفرانس مهندسی برق ایران، شهریور1392.##
      1. http:// communication.howstuffworks.com/ip-telephony.htm.##
      2. http://www.voip-iran.com.##
      3. W.Mazurczyk, “VoIP Steganography and Its Detection – A Survey, ACM Computing Surveys,” accepted for publications, ISSN 0360-0300, 2013.##
      4. W. Mazurczyk and J.Lubacz, “LACK—a VoIP steganographic method,” Telecommunication Syst: Model Anal Des Manag, vol. 45, no. 2-3, pp. 153-163, 2010.##
      5. W. Mazurczyk and K. Szczypiorski, “Steganography of VoIP streams,” On the Move to Meaningful Internet Systems: OTM 2008, vol. 5332, pp. 1001-1018, 2008.##
      6. M. Hamdaqa and L. Tahvildari, “ReLACK: A Reliable VoIP Steganography Approach,” in Fifth Internatinal Conference on Secure Software Integration and Reliability Improvement, pp. 190-197, 2011.##
      7. N. Aoki, “VoIP packet loss concealment based on two-side pitch waveform replication technique using steganography,” IEEE, vol. 100, pp. 52-55, 2004.##
      8. C. Wang and Q. Wu, “ Information hiding in real-time VoIP streams,” in Proceedings of in Proceedings of Ninth IEEE International Symposium on Multimedia, ser.ISM’ 07. Washington, DC, USA: IEEE Computer Society, pp. 255-262, 2007.##
      9. Y. Huang, S. Tang, and J. Yuan, “Steganography in inactive frames of VoIP streams encoded by source codec,” IEEE Transactions on information forensics and security, vol. 6, no. 2, pp. 296-306, 2011.##