Wojciech Mazurczyk
Warsaw University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Wojciech Mazurczyk.
Communications of The ACM | 2014
Elzbieta Zielinska; Wojciech Mazurczyk; Krzysztof Szczypiorski
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.
Telecommunication Systems | 2010
Wojciech Mazurczyk; Józef Lubacz
The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’s impact on quality of voice transmission and its resistance to steganalysis.
Multimedia Tools and Applications | 2014
Wojciech Mazurczyk; Pawel Szaga; Krzysztof Szczypiorski
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt data that is compressed to make space for the steganogram. The main innovation of TranSteg is to, for a chosen voice stream, find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected. Then, the voice stream is transcoded. At this step the original voice payload size is intentionally unaltered and the change of the codec is not indicated. Instead, after placing the transcoded voice payload, the remaining free space is filled with hidden data. TranSteg proof of concept implementation was designed and developed. The obtained experimental results are enclosed in this paper. They prove that the proposed method is feasible and offers a high steganographic bandwidth while introducing small voice degradation. Moreover, TranSteg detection is difficult to perform when compared with existing VoIP steganography methods.
ACM Computing Surveys | 2013
Wojciech Mazurczyk
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic methods are usually aimed at hiding the very existence of the communication. Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect carrier for steganographic purposes. This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.
IEEE Communications Surveys and Tutorials | 2015
Wojciech Mazurczyk; Luca Caviglione
By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of works evaluating the security degree of smartphones neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, and ii) conceal valuable or personal information into innocent looking carriers. Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014. The different approaches are grouped according to the portion of the device used to hide information, leading to three different covert channels, i.e., local, object and network. Also, it reviews the relevant approaches used to detect and mitigate steganographic attacks or threats. Lastly, it showcases the most popular software applications to embed secret data into carriers, as well as possible future directions.
arXiv: Multimedia | 2008
Wojciech Mazurczyk; Krzysztof Szczypiorski
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.
soft computing | 2011
Wojciech Mazurczyk; Milosz Smolarczyk; Krzysztof Szczypiorski
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms. The main innovation of RSTEG is to not acknowledge a successfully received packet in order to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG is presented in the broad context of network steganography, and the utilisation of RSTEG for TCP (transmission control protocol) retransmission mechanisms is described in detail. Simulation results are also presented with the main aim of measuring and comparing the steganographic bandwidth of the proposed method for different TCP retransmission mechanisms, as well as to determine the influence of RSTEG on the network retransmission level.
ieee international symposium on parallel & distributed processing, workshops and phd forum | 2013
Marcin Seredynski; Wojciech Mazurczyk; Djamel Khadraoui
The problem of how to adjust speed of vehicles so that they can arrive at the intersection when the light is green can be solved by means of Green Light Optimal Speed Advisory (GLOSA). The existing GLOSA approaches are single segment, that is, they consider traffic lights independently by providing vehicles with the optimal speed for the segment ahead of the nearest traffic lights. In this article we introduce a new approach-a multi segment GLOSA-according to which several lights in sequence on a vehicles route are taken into account. The speed optimisation process is performed using a genetic algorithm. We assume that a vehicle has access to all traffic light phase schedules that it will encounter on its route. The route is composed of segments divided by traffic lights. The proposed GLOSA provides a driver with speed advisory for each segment according to selected preferences like minimisation of total traveling time or fuel consumption. We demonstrate, that in free-flow conditions such multi-segment GLOSA results in much better results when compared with single-segment approach.
IEEE Communications Magazine | 2014
Józef Lubacz; Wojciech Mazurczyk; Krzysztof Szczypiorski
The article discusses basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of network steganographic methods and techniques.
Security and Communication Networks | 2012
Wojciech Mazurczyk
This paper presents first experimental results for an Internet Protocol (IP) telephony-based steganographic method called lost audio packets steganography (LACK). This method utilises the fact that in typical multimedia communication protocols such as Real-time Transport Protocol, excessively delayed packets are not used for the reconstruction of transmitted data at the receiver; that is, these packets are considered useless and discarded. The results presented in this paper were obtained on the basis of a functional LACK prototype and show the method’s impact on the quality of voice transmission. Achievable steganographic bandwidth for the different IP telephony codecs is also calculated. Copyright