{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:15:11Z","timestamp":1764713711024,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","award":["UIDB\/50021\/2020,CMU\/TIC\/0044\/2021"],"award-info":[{"award-number":["UIDB\/50021\/2020,CMU\/TIC\/0044\/2021"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3517419","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"1154-1167","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Stegozoa"],"prefix":"10.1145","author":[{"given":"Gabriel","family":"Figueira","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisboa, Portugal"}]},{"given":"Diogo","family":"Barradas","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Nuno","family":"Santos","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Internet censorship in Turkey. Internet Policy Review","author":"Akg\u00fcl M.","year":"2015","unstructured":"Akg\u00fcl , M. , and Kirlidoug , M . Internet censorship in Turkey. Internet Policy Review ( 2015 ). Akg\u00fcl, M., and Kirlidoug, M. Internet censorship in Turkey. Internet Policy Review (2015)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2012.6395377"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670386.2670389"},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the International Conference on Genetic and Evolutionary Computing","author":"An K.","year":"2019","unstructured":"An , K. , Lu , Z. , Yu , F. , and Luo , X . A Fast Data Hiding Algorithm for H.264\/AVC Video in Bitstream Domain . In Proceedings of the International Conference on Genetic and Evolutionary Computing ( 2019 ). An, K., Lu, Z., Yu, F., and Luo, X. A Fast Data Hiding Algorithm for H.264\/AVC Video in Bitstream Domain. In Proceedings of the International Conference on Genetic and Evolutionary Computing (2019)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2011.6012227"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6386"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428662.3428788"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0037"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277217"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417874"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363189"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978312"},{"key":"e_1_3_2_2_13_1","volume-title":"A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264. Sensors","author":"Cao M.","year":"2020","unstructured":"Cao , M. , Tian , L. , and Li , C . A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264. Sensors ( 2020 ). Cao, M., Tian, L., and Li, C. A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264. Sensors (2020)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3078822"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedigns of the USENIX Workshop on Free and Open Communications on the Internet","author":"Connolly C.","year":"2014","unstructured":"Connolly , C. , Lincoln , P. , Mason , I. , and Yegneswaran , V . TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography . In Proceedigns of the USENIX Workshop on Free and Open Communications on the Internet ( 2014 ). Connolly, C., Lincoln, P., Mason, I., and Yegneswaran, V. TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography. In Proceedigns of the USENIX Workshop on Free and Open Communications on the Internet (2014)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8551.001.0001"},{"key":"e_1_3_2_2_17_1","volume-title":"Obfsproxy: the next step in the censorship arms race. https:\/\/blog.torproject.org\/blog\/obfsproxy-next-step-censorship-arms-race","author":"Dingledine R.","year":"2012","unstructured":"Dingledine , R. Obfsproxy: the next step in the censorship arms race. https:\/\/blog.torproject.org\/blog\/obfsproxy-next-step-censorship-arms-race , 2012 . Accessed : 2021-11-19. Dingledine, R. Obfsproxy: the next step in the censorship arms race. https:\/\/blog.torproject.org\/blog\/obfsproxy-next-step-censorship-arms-race, 2012. Accessed: 2021-11-19."},{"key":"e_1_3_2_2_18_1","first-page":"2021","article-title":"Cryptographic secrecy analysis of adaptive steganographic syndrome-trellis codes","author":"Du H.","year":"2021","unstructured":"Du , H. , Liu , J. , Tian , Y. , and Luo , X . Cryptographic secrecy analysis of adaptive steganographic syndrome-trellis codes . Security and Communication Networks 2021 ( 2021 ). Du, H., Liu, J., Tian, Y., and Luo, X. Cryptographic secrecy analysis of adaptive steganographic syndrome-trellis codes. Security and Communication Networks 2021 (2021).","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the Internet Measurement Conference","author":"Ensafi R.","year":"2015","unstructured":"Ensafi , R. , Fifield , D. , Winter , P. , Feamster , N. , Weaver , N. , and Paxson , V . Examining How the Great Firewall Discovers Hidden Circumvention Servers . In Proceedings of the Internet Measurement Conference ( 2015 ). Ensafi, R., Fifield, D., Winter, P., Feamster, N., Weaver, N., and Paxson, V. Examining How the Great Firewall Discovers Hidden Circumvention Servers. In Proceedings of the Internet Measurement Conference (2015)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2011.6031852"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-46828-6_11"},{"key":"e_1_3_2_2_23_1","volume-title":"Stegozoa code repository. https:\/\/github.com\/GabrielCFigueira\/stegozoa-video","author":"Figueira G.","year":"2022","unstructured":"Figueira , G. Stegozoa code repository. https:\/\/github.com\/GabrielCFigueira\/stegozoa-video , 2022 . Figueira, G. Stegozoa code repository. https:\/\/github.com\/GabrielCFigueira\/stegozoa-video, 2022."},{"key":"e_1_3_2_2_24_1","volume-title":"Media Forensics and Security II","author":"Filler T.","year":"2010","unstructured":"Filler , T. , Judas , J. , and Fridrich , J . Minimizing embedding impact in steganography using trellis-coded quantization . In Media Forensics and Security II ( 2010 ). Filler, T., Judas, J., and Fridrich, J. Minimizing embedding impact in steganography using trellis-coded quantization. In Media Forensics and Security II (2010)."},{"key":"e_1_3_2_2_25_1","volume-title":"Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics. Multimedia Tools and Applications","author":"Ghamsarian N.","year":"2020","unstructured":"Ghamsarian , N. , Schoeffmann , K. , and Khademi , M . Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics. Multimedia Tools and Applications ( 2020 ). Ghamsarian, N., Schoeffmann, K., and Khademi, M. Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics. Multimedia Tools and Applications (2020)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2017.1700009"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2017.1700009"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9351-x"},{"key":"e_1_3_2_2_29_1","volume-title":"Intel\u00ae Advanced Vector Extensions Programming Reference","author":"Intel Corp.","year":"2011","unstructured":"Intel Corp. Intel\u00ae Advanced Vector Extensions Programming Reference , 2011 . Intel Corp. Intel\u00ae Advanced Vector Extensions Programming Reference, 2011."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3199524.3199534"},{"key":"e_1_3_2_2_31_1","volume-title":"This is what end-to-end encryption should look like! protectraggedrighthttps:\/\/jitsi.org\/blog\/e2ee\/","author":"Jitsi","year":"2020","unstructured":"Jitsi . This is what end-to-end encryption should look like! protectraggedrighthttps:\/\/jitsi.org\/blog\/e2ee\/ , 2020 . Accessed : 2021-11-19. Jitsi. This is what end-to-end encryption should look like! protectraggedrighthttps:\/\/jitsi.org\/blog\/e2ee\/, 2020. Accessed: 2021-11-19."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482965"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0028"},{"key":"e_1_3_2_2_34_1","volume-title":"Reverse-engineering censorship in China: Randomized experimentation and participant observation. Science","author":"King G.","year":"2014","unstructured":"King , G. , Pan , J. , and Roberts , M. E . Reverse-engineering censorship in China: Randomized experimentation and participant observation. Science ( 2014 ). King, G., Pan, J., and Roberts, M. E. Reverse-engineering censorship in China: Randomized experimentation and participant observation. Science (2014)."},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 5th USENIX Workshop on Free and Open Communications on the Internet","author":"Knockel J.","year":"2015","unstructured":"Knockel , J. , Crete-Nishihata , M. , Ng , J. Q. , Senft , A. , and Crandall , J. R . Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China . In Proceedings of the 5th USENIX Workshop on Free and Open Communications on the Internet ( 2015 ). Knockel, J., Crete-Nishihata, M., Ng, J. Q., Senft, A., and Crandall, J. R. Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China. In Proceedings of the 5th USENIX Workshop on Free and Open Communications on the Internet (2015)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897913"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665944"},{"key":"e_1_3_2_2_38_1","volume-title":"Video steganography: A review. Neurocomputing","author":"Liu Y.","year":"2019","unstructured":"Liu , Y. , Liu , S. , Wang , Y. , Zhao , H. , and Liu , S . Video steganography: A review. Neurocomputing ( 2019 ). Liu, Y., Liu, S., Wang, Y., Zhao, H., and Liu, S. Video steganography: A review. Neurocomputing (2019)."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5766"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0024"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0058"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_2_43_1","volume-title":"protectraggedrighthttps:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020--13901","author":"National Vulnerability Database. CVE-2020--13901 Detail.","year":"2020","unstructured":"National Vulnerability Database. CVE-2020--13901 Detail. protectraggedrighthttps:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020--13901 , 2020 . Accessed : 2021-11-19. National Vulnerability Database. CVE-2020--13901 Detail. protectraggedrighthttps:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020--13901, 2020. Accessed: 2021-11-19."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2003680"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00014"},{"key":"e_1_3_2_2_46_1","unstructured":"Perez S. Twitter's doubling of character count from 140 to 280 had little impact on length of tweets. protectraggedrighthttps:\/\/techcrunch.com\/2018\/10\/30\/twitters-doubling-of-character-count-from-140-to-280-had-little-impact-on-length-of-tweets\/ 2021. Accessed: 2021-11-19.  Perez S. Twitter's doubling of character count from 140 to 280 had little impact on length of tweets. protectraggedrighthttps:\/\/techcrunch.com\/2018\/10\/30\/twitters-doubling-of-character-count-from-140-to-280-had-little-impact-on-length-of-tweets\/ 2021. Accessed: 2021-11-19."},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings of the 30th The Web Conference","author":"Rambert R.","year":"2021","unstructured":"Rambert , R. , Weinberg , Z. , Barradas , D. , and Christin , N . Chinese wall or swiss cheese? Keyword filtering in the great firewall of china . In Proceedings of the 30th The Web Conference ( 2021 ). Rambert, R., Weinberg, Z., Barradas, D., and Christin, N. Chinese wall or swiss cheese? Keyword filtering in the great firewall of china. In Proceedings of the 30th The Web Conference (2021)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23098"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_2_50_1","volume-title":"Let's Reverse Engineer Discord. protectraggedrighthttps:\/\/medium.com\/tenable-techblog\/lets-reverse-engineer-discord-1976773f4626","author":"Wells D.","year":"2020","unstructured":"Wells , D. , and J. Bingham . Let's Reverse Engineer Discord. protectraggedrighthttps:\/\/medium.com\/tenable-techblog\/lets-reverse-engineer-discord-1976773f4626 , 2020 . Accessed : 2021-11-19. Wells, D., and J.Bingham. Let's Reverse Engineer Discord. protectraggedrighthttps:\/\/medium.com\/tenable-techblog\/lets-reverse-engineer-discord-1976773f4626, 2020. Accessed: 2021-11-19."},{"key":"e_1_3_2_2_51_1","volume-title":"RTP Topologies - RFC 7667. protectraggedrighthttps:\/\/datatracker.ietf.org\/doc\/html\/rfc7667","author":"Westerlund M.","year":"2015","unstructured":"Westerlund , M. , and Wenger , S . RTP Topologies - RFC 7667. protectraggedrighthttps:\/\/datatracker.ietf.org\/doc\/html\/rfc7667 , 2015 . Westerlund, M., and Wenger, S. RTP Topologies - RFC 7667. protectraggedrighthttps:\/\/datatracker.ietf.org\/doc\/html\/rfc7667, 2015."},{"key":"e_1_3_2_2_52_1","volume-title":"the free encyclopedia. Wikipedia:Size in volumes. protectraggedrighthttps:\/\/en.wikipedia.org\/wiki\/Wikipedia:Size_in_volumes","author":"Wikipedia","year":"2021","unstructured":"Wikipedia , the free encyclopedia. Wikipedia:Size in volumes. protectraggedrighthttps:\/\/en.wikipedia.org\/wiki\/Wikipedia:Size_in_volumes , 2021 . Accessed : 2021-11-19. Wikipedia, the free encyclopedia. Wikipedia:Size in volumes. protectraggedrighthttps:\/\/en.wikipedia.org\/wiki\/Wikipedia:Size_in_volumes, 2021. Accessed: 2021-11-19."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335711"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487858"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2949428"},{"key":"e_1_3_2_2_56_1","volume-title":"Motion vector-based video steganography with preserved local optimality. Multimedia Tools and Applications","author":"Zhang H.","year":"2016","unstructured":"Zhang , H. , Cao , Y. , and Zhao , X . Motion vector-based video steganography with preserved local optimality. Multimedia Tools and Applications ( 2016 ). Zhang, H., Cao, Y., and Zhao, X. Motion vector-based video steganography with preserved local optimality. Multimedia Tools and Applications (2016)."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623587"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3030685"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978365"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3517419","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3517419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:30Z","timestamp":1750193310000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3517419"}},"subtitle":["Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention"],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":58,"alternative-id":["10.1145\/3488932.3517419","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3517419","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}