[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2897845.2897913acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

SkypeLine: Robust Hidden Data Transmission for VoIP

Published: 30 May 2016 Publication History

Abstract

Internet censorship is used in many parts of the world to prohibit free access to online information. Different techniques such as IP address or URL blocking, DNS hijacking, or deep packet inspection are used to block access to specific content on the Internet. In response, several censorship circumvention systems were proposed that attempt to bypass existing filters. Especially systems that hide the communication in different types of cover protocols attracted a lot of attention. However, recent research results suggest that this kind of covert traffic can be easily detected by censors. In this paper, we present SkypeLine, a censorship circumvention system that leverages Direct-Sequence Spread Spectrum (DSSS) based steganography to hide information in Voice-over-IP (VoIP) communication. SkypeLine introduces two novel modulation techniques that hide data by modulating information bits on the voice carrier signal using pseudo-random, orthogonal noise sequences and repeating the spreading operation several times. Our design goals focus on undetectability in presence of a strong adversary and improved data rates. As a result, the hiding is inconspicuous, does not alter the statistical characteristics of the carrier signal, and is robust against alterations of the transmitted packets. We demonstrate the performance of SkypeLine based on two simulation studies that cover the theoretical performance and robustness. Our measurements demonstrate that the data rates achieved with our techniques substantially exceed existing DSSS approaches. Furthermore, we prove the real-world applicability of the presented system with an exemplary prototype for Skype.

References

[1]
Ekiga: Softphone, video conferencing, and instant messenger. http://www.ekiga.org, 2014.
[2]
Empathy messaging program. http://live.gnome.org/Empathy, 2014.
[3]
Opus codec. http://www.opus-codec.org/, 2014.
[4]
Wireshark. http://www.wireshark.org/, 2014.
[5]
Broadcom codec comparison. http://www.broadcom.com/support/broadvoice/codec_comparison.php, 2015.
[6]
M. Asad, J. Gilani, and A. Khalid. An enhanced least significant bit modification technique for audio steganography. In Computer Networks and Information Technology (ICCNIT), 2011 International Conference on, 2011.
[7]
H. Assem, D. Malone, J. Dunne, and P. O'Sullivan. Monitoring voip call quality using improved simplified e-model. In Computing, Networking and Communications (ICNC), 2013 International Conference on, 2013.
[8]
Carletta. The AMI Meeting Corpus: A Pre-announcement. In Second International Conference on Machine Learning for Multimodal Interaction, 2006.
[9]
Castglione, D'Alessio, and Santis. Steganography and secure communication on online social networks and online photo sharing. BWCCA, 2011.
[10]
Castglione, Santis, Fiore, and Palmieri. An asynchronous covert channel using spam. Computers and Mathematics with Applications, 2012.
[11]
Castiglione, D'Alessio, Santis, and Palmieri. New steganographic techniques for the ooxml file format. ARES, 2011.
[12]
Castiglione, Santis, Fiore, and Palmieri. E-mail-based covert channels for asynchronous message steganography. Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011.
[13]
C. Connolly, P. Lincoln, I. Mason, and V. Yegneswaran. Trist: Circumventing censorship with transcoding-resistant image steganography. In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14), 2014.
[14]
R. Dingledine and N. Mathewson. Design of a blocking-resistant anonymity system. Technical report, The Tor Project, 2006.
[15]
J. Geddes, M. Schuchard, and N. Hopper. Cover your acks: Pitfalls of covert channel censorship circumvention. In ACM SIGSAC Conference on Computer &; Communications Security, 2013.
[16]
M. Hamdaqa and L. Tahvildari. Relack: A reliable voip steganography approach. In Secure Software Integration and Reliability Improvement (SSIRI), 2011 Fifth International Conference on, 2011.
[17]
A. Houmansadr, C. Brubaker, and V. Shmatikov. The Parrot is Dead: Observing Unobservable Network Communications. In Security and Privacy (SP), 2013 IEEE Symposium on, 2013.
[18]
A. Houmansadr, G. T. K. Nguyen, M. Caesar, and N. Borisov. Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability. In Computer and Communications Security. ACM, 2011.
[19]
A. Houmansadr, T. Riedl, N. Borisov, and A. Singer. I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. In Network and Distributed System Security, 2013.
[20]
L. Invernizzi, C. Kruegel, and G. Vigna. Message In A Bottle: Sailing Past Censorship. In Annual Computer Security Applications Conference, 2013.
[21]
A. Janicki, W. Mazurczyk, and K. Szczypiorski. On the undetectability of transcoding steganography. Security and Communication Networks, 2015.
[22]
B. Jones, S. Burnett, N. Feamster, S. Donovan, S. Grover, S. Gunasekaran, and K. Habak. Facade: High-throughput, deniable censorship circumvention using web search. In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14), 2014.
[23]
K. S. K. Vos, S. Jensen. RFC Draft: Silk. 2009.
[24]
J. Knockel. Tom-skype research. http://cs.unm.edu/ jeffk/tom-skype/, 2013.
[25]
J. Knockel, J. R. Crandall, and J. Saia. Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance, 2011.
[26]
K. Kohls, T. Holz, D. Kolossa, and C. Pöpper. Skypeline: Robust hidden data transmission for VoIP. Technical Report TR-HGI-2016-001, RUB, 2016.
[27]
Z. Ling, X. Fu, W. Yu, J. Luo, and M. Yang. Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery. In INFOCOM, 2012.
[28]
J. Liu, K. Zhou, and H. Tian. Least-significant-digit steganography in low bitrate speech. In Communications (ICC), 2012 IEEE International Conference on, 2012.
[29]
Mazurczyk and Caviglione. Steganography in modern smartphones and mitigation techniques. Multimedia Tools and Applications, 2014.
[30]
W. Mazurczyk. Voip steganography and its detection - a survey. ACM Comput. Surv., 46(2):20:1--20:21, Dec. 2013.
[31]
W. Mazurczyk, M. Karas, K. Szczypiorski, and A. Janicki. Youskyde: information hiding for skype video traffic. Multimedia Tools and Applications, 2015.
[32]
W. Mazurczyk and J. Lubacz. LACK - a VoIP Steganographic Method. CoRR, 2008.
[33]
W. Mazurczyk, P. Szaga, and K. Szczypiorski. Using transcoding for hidden communication in ip telephony. Multimedia Tools and Applications, 70(3):2139--2165, 2012.
[34]
H. Mohajeri Moghaddam, B. Li, M. Derakhshani, and I. Goldberg. SkypeMorph: Protocol Obfuscation for Tor Bridges. In Computer and Communications Security, 2012.
[35]
H. Neal and H. ElAarag. A packet loss tolerant algorithm for information hiding in voice over IP. In Southeastcon, 2012 Proceedings of IEEE, 2012.
[36]
M. Nutzinger, C. Fabian, and M. Marschalek. Secure hybrid spread spectrum system for steganography in auditive media. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on, 2010.
[37]
M. Nutzinger and J. Wurzer. A novel phase coding technique for steganography in auditive media. In Sixth International Conference on Availability, Reliability and Security (ARES), 2011.
[38]
A. H. Ouda and M. R. El-Sakka. A step towards practical steganography systems. In International Conference on Image Analysis and Recognition, ICIAR'05, 2005.
[39]
N. Provos and P. Honeyman. Detecting steganographic content on the internet. http://www.citi.umich.edu/techreports/reports/citi-tr-01--11.pdf, 2001.
[40]
R. Roselinkiruba and R. Balakirshnan. Secure steganography in audio using inactive frames of voip streams. In Information Communication Technologies (ICT), IEEE Conference on, 2013.
[41]
T. Takahashi and W. Lee. An Assessment of VoIP Covert Channel Threats. In Third International Conference on Security and Privacy in Communications Networks and the Workshops, 2007.
[42]
http://vb-audio.pagesperso-orange.fr/Cable/. Vbcable, 2015.
[43]
Q. Wang, X. Gong, G. T. K. Nguyen, A. Houmansadr, and N. Borisov. CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing. In Computer and Communications Security. ACM, 2012.
[44]
Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, and D. Boneh. StegoTorus: A Camouflage Proxy for the Tor Anonymity System. In Computer and Communications Security. ACM, 2012.
[45]
E. Xu, B. Liu, L. Xu, Z. Wei, B. Zhao, and J. Su. Adaptive voip steganography for information hiding within network audio streams. In Network-Based Information Systems (NBiS), 2011 14th International Conference on, pages 612--617, 2011.
[46]
Z. Yang, H. Liu, H. Liu, and X. Lv. The applied research on internet of things engineering surveillance's records management. In Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on, pages 689--693, June 2012.
[47]
E. Zielinska and K. Szczypiorski. Direct sequence spread spectrum steganographic scheme for IEEE 802.15.4. In Multimedia Information Networking and Security (MINES), 2011 Third International Conference on, 2011.

Cited By

View all
  • (2024)RoCC:robust covert communication based on cross-modal information retrievalJournal of Image and Graphics10.11834/jig.23050429:2(369-381)Online publication date: 2024
  • (2024)Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336121219(3380-3394)Online publication date: 2024
  • (2023)Security and PrivacyMultidisciplinary Perspectives on Artificial Intelligence and the Law10.1007/978-3-031-41264-6_5(81-101)Online publication date: 27-Dec-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
May 2016
958 pages
ISBN:9781450342339
DOI:10.1145/2897845
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DSSS
  2. VOIP
  3. censorship circumvention
  4. covert communication
  5. steganography

Qualifiers

  • Research-article

Conference

ASIA CCS '16
Sponsor:

Acceptance Rates

ASIA CCS '16 Paper Acceptance Rate 73 of 350 submissions, 21%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)2
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)RoCC:robust covert communication based on cross-modal information retrievalJournal of Image and Graphics10.11834/jig.23050429:2(369-381)Online publication date: 2024
  • (2024)Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336121219(3380-3394)Online publication date: 2024
  • (2023)Security and PrivacyMultidisciplinary Perspectives on Artificial Intelligence and the Law10.1007/978-3-031-41264-6_5(81-101)Online publication date: 27-Dec-2023
  • (2022)StegozoaProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security10.1145/3488932.3517419(1154-1167)Online publication date: 30-May-2022
  • (2022)Security Foundations for Application-Based Covert Communication Channels2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833752(1971-1986)Online publication date: May-2022
  • (2022)Procedures, Criteria, and Machine Learning Techniques for Network Traffic Classification: A SurveyIEEE Access10.1109/ACCESS.2022.318113510(61135-61158)Online publication date: 2022
  • (2020)Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTCProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3417874(35-48)Online publication date: 30-Oct-2020
  • (2020)TruzCall: Secure VoIP Calling on Android using ARM TrustZone2020 Sixth International Conference on Mobile And Secure Services (MobiSecServ)10.1109/MobiSecServ48690.2020.9042945(1-12)Online publication date: Feb-2020
  • (2020)A review on machine learning–based approaches for Internet traffic classificationAnnals of Telecommunications10.1007/s12243-020-00770-775:11-12(673-710)Online publication date: 22-Jun-2020
  • (2019)VoIP Steganography Methods, a SurveyCybernetics and Information Technologies10.2478/cait-2019-000419:1(73-87)Online publication date: 29-Mar-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media