Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wojciech Mazurczyk is active.

Publication


Featured researches published by Wojciech Mazurczyk.


Communications of The ACM | 2014

Trends in steganography

Elzbieta Zielinska; Wojciech Mazurczyk; Krzysztof Szczypiorski

Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.


Telecommunication Systems | 2010

LACK--a VoIP steganographic method

Wojciech Mazurczyk; Józef Lubacz

The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’s impact on quality of voice transmission and its resistance to steganalysis.


Multimedia Tools and Applications | 2014

Using transcoding for hidden communication in IP telephony

Wojciech Mazurczyk; Pawel Szaga; Krzysztof Szczypiorski

The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt data that is compressed to make space for the steganogram. The main innovation of TranSteg is to, for a chosen voice stream, find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected. Then, the voice stream is transcoded. At this step the original voice payload size is intentionally unaltered and the change of the codec is not indicated. Instead, after placing the transcoded voice payload, the remaining free space is filled with hidden data. TranSteg proof of concept implementation was designed and developed. The obtained experimental results are enclosed in this paper. They prove that the proposed method is feasible and offers a high steganographic bandwidth while introducing small voice degradation. Moreover, TranSteg detection is difficult to perform when compared with existing VoIP steganography methods.


ACM Computing Surveys | 2013

VoIP steganography and its Detection—A survey

Wojciech Mazurczyk

Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic methods are usually aimed at hiding the very existence of the communication. Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect carrier for steganographic purposes. This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.


IEEE Communications Surveys and Tutorials | 2015

Steganography in Modern Smartphones and Mitigation Techniques

Wojciech Mazurczyk; Luca Caviglione

By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of works evaluating the security degree of smartphones neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, and ii) conceal valuable or personal information into innocent looking carriers. Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014. The different approaches are grouped according to the portion of the device used to hide information, leading to three different covert channels, i.e., local, object and network. Also, it reviews the relevant approaches used to detect and mitigate steganographic attacks or threats. Lastly, it showcases the most popular software applications to embed secret data into carriers, as well as possible future directions.


arXiv: Multimedia | 2008

Covert Channels in SIP for VoIP Signalling

Wojciech Mazurczyk; Krzysztof Szczypiorski

In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.


soft computing | 2011

Retransmission steganography and its detection

Wojciech Mazurczyk; Milosz Smolarczyk; Krzysztof Szczypiorski

The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms. The main innovation of RSTEG is to not acknowledge a successfully received packet in order to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG is presented in the broad context of network steganography, and the utilisation of RSTEG for TCP (transmission control protocol) retransmission mechanisms is described in detail. Simulation results are also presented with the main aim of measuring and comparing the steganographic bandwidth of the proposed method for different TCP retransmission mechanisms, as well as to determine the influence of RSTEG on the network retransmission level.


ieee international symposium on parallel & distributed processing, workshops and phd forum | 2013

Multi-segment Green Light Optimal Speed Advisory

Marcin Seredynski; Wojciech Mazurczyk; Djamel Khadraoui

The problem of how to adjust speed of vehicles so that they can arrive at the intersection when the light is green can be solved by means of Green Light Optimal Speed Advisory (GLOSA). The existing GLOSA approaches are single segment, that is, they consider traffic lights independently by providing vehicles with the optimal speed for the segment ahead of the nearest traffic lights. In this article we introduce a new approach-a multi segment GLOSA-according to which several lights in sequence on a vehicles route are taken into account. The speed optimisation process is performed using a genetic algorithm. We assume that a vehicle has access to all traffic light phase schedules that it will encounter on its route. The route is composed of segments divided by traffic lights. The proposed GLOSA provides a driver with speed advisory for each segment according to selected preferences like minimisation of total traveling time or fuel consumption. We demonstrate, that in free-flow conditions such multi-segment GLOSA results in much better results when compared with single-segment approach.


IEEE Communications Magazine | 2014

Principles and overview of network steganography

Józef Lubacz; Wojciech Mazurczyk; Krzysztof Szczypiorski

The article discusses basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of network steganographic methods and techniques.


Security and Communication Networks | 2012

Lost audio packets steganography: the first practical evaluation

Wojciech Mazurczyk

This paper presents first experimental results for an Internet Protocol (IP) telephony-based steganographic method called lost audio packets steganography (LACK). This method utilises the fact that in typical multimedia communication protocols such as Real-time Transport Protocol, excessively delayed packets are not used for the reconstruction of transmitted data at the receiver; that is, these packets are considered useless and discarded. The results presented in this paper were obtained on the basis of a functional LACK prototype and show the method’s impact on the quality of voice transmission. Achievable steganographic bandwidth for the different IP telephony codecs is also calculated. Copyright

Collaboration


Dive into the Wojciech Mazurczyk's collaboration.

Top Co-Authors

Avatar

Krzysztof Szczypiorski

Warsaw University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Luca Caviglione

National Research Council

View shared research outputs
Top Co-Authors

Avatar

Zbigniew Kotulski

Warsaw University of Technology

View shared research outputs
Top Co-Authors

Avatar

Krzysztof Cabaj

Warsaw University of Technology

View shared research outputs
Top Co-Authors

Avatar

Sebastian Zander

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Józef Lubacz

Warsaw University of Technology

View shared research outputs
Top Co-Authors

Avatar

Amir Houmansadr

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Artur Janicki

Warsaw University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge