Abstract
The rapid advancement of artificial intelligence and mobile communication technologies has brought unprecedented convenience, but also significant privacy and security concerns, particularly in real-time video communications, such as deepfake. Several researchers have investigated multiple security measures, with Covert Timing Channels (CTCs) emerging as a promising technique for secure information transmission, yet most of them suffer from low transmission efficiency, limiting their real-time responsiveness and network adaptability, making them inadequate for high-capacity covert information transmission. To address this limitation, this paper proposes a novel CTC scheme that modulates the Inter-Frame Delay (IFD) between audio and video frames during VoLTE(Voice over LTE) video calls to transmit covert information. Furthermore, to maintain the undetectability of the channel, a fitting algorithm is used to ensure that the cumulative distribution function (CDF) of the IFD of covert traffic aligns with that of legitimate traffic. The design also incorporates an embedding factor that allows communicating parties to dynamically adjust network parameters, balancing robustness, transmission efficiency, and undetectability. Experimental results demonstrate that, compared to existing methods, the proposed IFDCTC scheme achieves higher transmission efficiency, with a peak transmission rate of up to 30 bps, while maintaining acceptable bit error rates and strong undetectability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yin, Q., Lu, W., Li, B., Huang, J.: Dynamic difference learning with spatio-temporal correlation for deepfake video detection. IEEE Trans. Inf. Forensics Secur. 18, 4046–4058 (2023)
Shang, J., Wu, J.: Protecting real-time video chat against fake facial videos generated by face reenactment. In: 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), pp. 689–699 (2020)
Mittal, G., Hegde, C., Memon, N.: GOTCHA: real-time video deepfake detection via challenge-response. In: 2024 IEEE 9th European Symposium on Security and Privacy, pp. 1–20. IEEE Computer Society, Los Alamitos, CA, USA (2024)
Zhang, T., Li, B., Zhu, Y., Han, T., Wu, Q.: Covert channels in blockchain and blockchain based covert communication: overview, state-of-the-art, and future directions. Comput. Commun. 205, 136–146 (2023)
Caviglione, L., Mazurczyk, W.: You can’t do that on protocols anymore: analysis of covert channels in IETF standards. IEEE Netw. 38(5), 255–263 (2024)
Żórawski, P., Caviglione, L., Mazurczyk, W.: A long-term perspective of the internet susceptibility to covert channels. IEEE Commun. Mag. 61(10), 171–177 (2023)
Costa, G., Pinelli, F., Soderi, S., Tolomei, G.: Turning federated learning systems into covert channels. IEEE Access 10, 130642–130656 (2022)
Bedi, P., Jindal, V., Dua, A.: SPYIPv6: locating covert data in one or a combination of IPv6 header field(s). IEEE Access 11, 103486–103501 (2023)
Dua, A., Jindal, V., Bedi, P.: Covert communication using address resolution protocol broadcast request messages. In: 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 1–6 (2021)
Teca, G., Natkaniec, M.: A novel covert channel for IEEE 802.11 networks utilizing MAC address randomization. Appl. Sci. 13, 8000 (2023)
Liang, C., Tan, Y.A., Zhang, X., Wang, X., Zheng, J., Zhang, Q.: Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118, 144–153 (2018)
Tan, Y.A., Xu, X., Liang, C., Zhang, X., Zhang, Q., Li, Y.: An end-to-end covert channel via packet dropout for mobile networks. Int. J. Distrib. Sens. Netw. 14(5), 1550147718779568 (2018)
Luo, X., Zhang, P., Zhang, M., Li, H., Cheng, Q.: A novel covert communication method based on bitcoin transaction. IEEE Trans. Industr. Inf. 18(4), 2830–2839 (2022)
Tan, Y.A., Zhang, X., Sharif, K., Liang, C., Zhang, Q., Li, Y.: Covert timing channels for IoT over mobile networks. IEEE Wireless Commun. 25(6), 38–44 (2018)
Yuanzhang, L., Junli, L., Xinting, X., Xiaosong, Z., Li, Z., Quanxin, Z.: A robust packet-dropping covert channel for mobile intelligent terminals. Int. J. Intell. Syst. 37(10), 6928–6950 (2022)
Zhang, X., Tan, Y.A., Liang, C., Li, Y., Li, J.: A covert channel over volte via adjusting silence periods. IEEE Access 6, 9292–9302 (2018)
Yu, C., Chen, S., Wei, Z., Wang, F.: Toward a truly secure telecom network: analyzing and exploiting vulnerable security configurations/ implementations in commercial LTE/IMS networks. IEEE Trans. Dependable Secure Comput. 21(4), 3048–3064 (2024)
Li, Y., Zhang, X., Xu, X., Tan, Y.A.: A robust packet-dropout covert channel over wireless networks. IEEE Wireless Commun. 27(3), 60–65 (2020)
Zhang, X., Liang, C., Zhang, Q., Li, Y., Zheng, J., Tan, Y.A.: Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445-446, 66–78 (2018)
Liang, C., Baker, T., Li, Y., Nawaz, R., Tan, Y.A.: Building covert timing channel of the IoT-enabled MTS based on multi-stage verification. IEEE Trans. Intell. Transp. Syst. 24(2), 2578–2595 (2023)
Guri, M.: Air-gap electromagnetic covert channel. IEEE Trans. Dependable Secure Comput. 21(4), 2127–2144 (2024)
Schmidbauer, T., Keller, J., Wendzel, S.: Challenging channels: encrypted covert channels within challenge-response authentication. In: Proceedings of the 17th International Conference on Availability, Reliability and Security. ARES ’22, Association for Computing Machinery, New York, NY, USA (2022)
Liang, C., Wang, X., Zhang, X., Zhang, Y., Sharif, K., Tan, Y.A.: A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf. Sci. 465, 162–173 (2018)
Son, S., Kwon, D., Lee, S., Jeon, Y., Park, Y.: A robust covert channel with self-bit recovery for IEEE 802.11 networks. IEEE Internet Things J. 11(16), 27356–27368 (2024)
Sawicki, K., Bieszczad, G., Piotrowski, Z.: StegoFrameOrder-MAC layer covert network channel for wireless IEEE 802.11 Networks. Sensors 21(18) (2021)
Seong, H., Kim, I., Jeon, Y., Oh, M.K., Lee, S., Choi, D.: Practical covert wireless unidirectional communication in IEEE 802.11 environment. IEEE Internet Things J. 10(2), 1499–1516 (2023)
Teca, G., Natkaniec, M.: StegoBackoff: creating a covert channel in smart grids using the backoff procedure of IEEE 802.11 networks. Energies 17(3) (2024)
Chen, Z., Zhu, L., Jiang, P., Zhang, C., Gao, F., Guo, F.: Exploring unobservable blockchain-based covert channel for censorship-resistant systems. IEEE Trans. Inf. Forensics Secur. 19, 3380–3394 (2024)
Elsadig, M.A., Gafar, A.: Covert channel detection: machine learning approaches. IEEE Access 10, 38391–38405 (2022)
Iv, J.K.H., Georgiou, M., Malozemoff, A.J., Shrimpton, T.: Security foundations for application-based covert communication channels. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1971–1986 (2022)
Liang, Q., Shi, N., Tan, Y.A., Li, C., Liang, C.: A stealthy communication model with blockchain smart contract for bidding systems. Electronics 13(13), 2523 (2024)
Acknowledgments
This research was supported by R&D Program of Beijing Municipal Education Commission (KM202311232013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wu, X., sun, X., Huang, J., Shi, N., Liang, C. (2025). Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay Modulation. In: Zhang, F., Lin, W., Yan, H. (eds) Artificial Intelligence Security and Privacy. AIS&P 2024. Lecture Notes in Computer Science, vol 15399. Springer, Singapore. https://doi.org/10.1007/978-981-96-1148-5_7
Download citation
DOI: https://doi.org/10.1007/978-981-96-1148-5_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-1147-8
Online ISBN: 978-981-96-1148-5
eBook Packages: Computer ScienceComputer Science (R0)