Informative Information for the Uninformed
Current
v9
v8
v7
v6
v5
v4
v3
v2
v1
All
About
Vol 8
»
2007.Sep
Next:
List of Figures
Up:
Real-time Steganography with RTP
Previous:
Real-time Steganography with RTP
Contents
List of Figures
List of Tables
Introduction
Overview
Voice over IP
Real-time Transport Protocol
Steganography
Terminology
Digitally Embedding
Steganography With Audio
Previous Research
Real-time Steganography
Context Terminology
RTP Payload Redundant Bits
Audio Word Size
Common VoIP Audio Codecs
G.711 (alaw/ulaw)
Identified Problems and Challenges
Unreliable Transport
Cover-Medium Size Limitations
Latency
Tracking of RTP Streams
Raw vs. Compressed Audio
Media Gateway Audio Modifications
Mid-session Audio Codec Change
Reference Implementation: SteganRTP
Design Goals
Achieve Steganography
Full-Duplex Communications Channel
Compensate for Unreliable Transport
Identical User Experience Regardless of Mode of Operation
Multi-type Data Transfer
Operational Architecture
Local Operation
Man-in-the-Middle Operation
Mixed Operation
Application Flow
Initialization
RTP Session Identification
Hooking Packets
Reading Packets
Inbound Processing
Outbound Processing
Session Timeout
Communication Protocol Specification
The cover medium: RTP Packet
Message Format
Message Types
Functional Components
File Descriptor Lists
Message Handler
Encryption System
Embedding System
Extraction System
Outbound Data Polling System
Message Caching System
Shell Service
Use
Command-line
User Interface
Solutions to Problems and Challenges
Unreliable Transport
Cover-Medium Size Limitations
Latency
Inbound Packet Processing
Outbound Packet Processing
Encryption Overhead
Tracking of RTP Streams
Media Gateway Audio Modifications
Audio Codec Conversion
Mid-session Audio Codec Change
Conclusion
Design Goals
Identified Challenges
Secure Real-time Transfer Protocol
Future Research
Bibliography