Connect with us

Hi, what are you looking for?



Researchers Encode Hidden Messages in Skype Calls

University researchers developed a way to encode hidden messages using the silent portions of a Skype call.

University researchers developed a way to encode hidden messages using the silent portions of a Skype call.

Since Skype transmits voice data using 130-byte packets and silences in 70-byte packets, researchers at the Institute of Telecommunications of the Warsaw University of Technology were able to hide a message using structured sequences of silent packets, according to a report in the New Scientist. Wojciech Mazurczyk, Krysztof Szczypiorsk, and Maciej Karaœ built the SkypeHide (also known as SkyDe) application to demonstrate their technique. The application on the sending computer encodes a message in the silent packets in the call’s data stream.

The application on the receiving computer reads the smaller data packets to extract the message. Hidden messages can contain text, audio or video content, so long as the total message does not exceed the maximum transmission rate of 1kbps.

Mazurczyk and Szczypiorski built on their earlier research in steganography using VoIP streams to build SkypeHide. They had previously developed techniques to use empty fields in the RTCP (Real-Time Control Protocol) and RTP (Real-Time Transport Protocol) VoIP protocols to transmit hidden messages. 
The “packet hijack” is hard to detect, as the packets containing the hidden message would be indistinguishable from the normal packets transmitting silence, according to the New Scientist report.

Skype relies on peer-to-peer connections to make calls, making it difficult for malicious parties to intercept or eavesdrop on Skype calls. However, law enforcement has complained this makes it difficult for them to listen in on suspects and other persons of interest using the service to plan or discuss their activities. While Skype has not discussed how its technology works, there have been hints the company could hand over Skype call log data as part of a legal proceeding.

Microsoft, which now owns Skype, has denied rewriting the tool to include a backdoor to allow eavesdropping.

SkypeHide will be presented in June at the First ACM Information Hiding and Multimedia Security Workshop at the University of Montpellier.

Advertisement. Scroll to continue reading.

Related Reading: Defeating Skype Encryption Without a Key

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.