Information hiding is increasingly used to implement covert channels, to exfiltrate data or to perform attacks in a stealthy manner. Another important usage deals with privacy, for instance, to bypass limitations imposed by a regime, to prevent censorship or to share information in sensitive scenarios such as those dealing with cyber defense. In this perspective, the paper investigates how VoIP communications can be used as a methodology to enhance privacy. Specifically, we propose to hide traffic into VoIP conversations in order to prevent the disclosure, exposure and revelation to an attacker or blocking the ongoing exchange of information. To this aim, we exploit the voice activity detection feature available in many client interfaces to...
In the field of computer security, covert communication is usually seen as adversarial, but from ano...
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. ...
Channeling voice calls over IP networks has brought many advantages to enterprise communications, bu...
Abstract. In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) ...
The success of the Internet has brought significant changes to the telecommunication industry. One o...
The success of the Internet has brought significant changes to the telecommunication industry. One o...
Steganography is an effective way of hiding secret data, by this means of protecting the data from u...
While confidentiality of telephone conversation contents has recently received considerable attentio...
Abstract—A VoIP covert channel is a mechanism that utilizes an IP phone conversation to illicitly tr...
ABSTRACT Voice communication carried out using the Internet Protocol (IP) for the transaction is kno...
Information Security has evolved significantly over the last decade and even more quickly over the l...
Voice Service Providers (VSPs) participating in VoIP peering frequently want to withhold their ident...
Abstract — Peer-to-Peer VoIP (voice over IP) networks, exem-plified by Skype [4], are becoming incre...
The use of Voice over IP (VoIP) applications has dramatically increased in recent years. Large, medi...
The use of Voice over IP (VoIP) applications has dramatically increased in recent years. Large, medi...
In the field of computer security, covert communication is usually seen as adversarial, but from ano...
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. ...
Channeling voice calls over IP networks has brought many advantages to enterprise communications, bu...
Abstract. In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) ...
The success of the Internet has brought significant changes to the telecommunication industry. One o...
The success of the Internet has brought significant changes to the telecommunication industry. One o...
Steganography is an effective way of hiding secret data, by this means of protecting the data from u...
While confidentiality of telephone conversation contents has recently received considerable attentio...
Abstract—A VoIP covert channel is a mechanism that utilizes an IP phone conversation to illicitly tr...
ABSTRACT Voice communication carried out using the Internet Protocol (IP) for the transaction is kno...
Information Security has evolved significantly over the last decade and even more quickly over the l...
Voice Service Providers (VSPs) participating in VoIP peering frequently want to withhold their ident...
Abstract — Peer-to-Peer VoIP (voice over IP) networks, exem-plified by Skype [4], are becoming incre...
The use of Voice over IP (VoIP) applications has dramatically increased in recent years. Large, medi...
The use of Voice over IP (VoIP) applications has dramatically increased in recent years. Large, medi...
In the field of computer security, covert communication is usually seen as adversarial, but from ano...
Voice over Internet Protocol (VoIP) is widely embedded into commercial and industrial applications. ...
Channeling voice calls over IP networks has brought many advantages to enterprise communications, bu...