DeepSec 2010: Mobile VoIP Steganography: From Framework to Implementation
Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speakers: Rainer Poisel | Marcus Nutzinger, Ins...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube.
Speakers: Rainer Poisel | Marcus Nutzinger, Institute of IT Security Research, St. Polten University of Applied Sciences, Austria
The need for steganography has arisen from scenarios that forbid the application of cryptographic algorithms for secure communications. Countries that made secret message exchange a delict are an example for such scenarios. This talk describes the development and implementation of a framework based on a novel layered model for auditive steganography. Focus of this presentation is a description of the implementation for mobile devices which include a version for commodity hardware, e.g. WLAN routers, using the OpenWRT SDK. Further the integration into mobile or satellite phones is discussed. Our approach is based on algorithms that use the analogous representation of the digital cover media, hence making the covert channel more resistant against transmission errors.
For more information visit: http://bit.ly/DeepSec_2010_information
To download the video visit: http://bit.ly/DeepSec_2010_videos
Video Information
Views
492
Total views since publication
Likes
2
User likes and reactions
Duration
49:31
Video length
Published
Aug 5, 2011
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#DeepSec #2010 #Security #Conference #Europe #Attacks #Techniques #Vulnerabilities #Research #Presentation #voip #steganography #encryption #telephony
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.