On the suitability of the internet multimedia storage for steganographic information transfer in MP4 files
Kybernetika (2012)
- Volume: 48, Issue: 3, page 522-535
- ISSN: 0023-5954
Access Full Article
topAbstract
topHow to cite
topJókay, Matúš, and Baroš, Ján. "On the suitability of the internet multimedia storage for steganographic information transfer in MP4 files." Kybernetika 48.3 (2012): 522-535. <http://eudml.org/doc/246567>.
@article{Jókay2012,
abstract = {The aim of this work is to analyze suitability of existing internet multimedia storage services to use as a covert (steganographic) transmission channel. After general overview we focus specifically on the YouTube service. In particular, we study the feasibility of the recently proposed new steganographic technique [6] of hiding information directly in the structure of the mp4-encoded video file. Our statistical analysis of the set of 1000 video files stored by this service show the practical limitations for this type of information hiding.},
author = {Jókay, Matúš, Baroš, Ján},
journal = {Kybernetika},
keywords = {steganography; mp4 file; multimedia storage; YouTube; steganography; MP4 file; multimedia storage; YouTube video files; statistical analysis; Internet multimedia; practical limitations; transmission channel},
language = {eng},
number = {3},
pages = {522-535},
publisher = {Institute of Information Theory and Automation AS CR},
title = {On the suitability of the internet multimedia storage for steganographic information transfer in MP4 files},
url = {http://eudml.org/doc/246567},
volume = {48},
year = {2012},
}
TY - JOUR
AU - Jókay, Matúš
AU - Baroš, Ján
TI - On the suitability of the internet multimedia storage for steganographic information transfer in MP4 files
JO - Kybernetika
PY - 2012
PB - Institute of Information Theory and Automation AS CR
VL - 48
IS - 3
SP - 522
EP - 535
AB - The aim of this work is to analyze suitability of existing internet multimedia storage services to use as a covert (steganographic) transmission channel. After general overview we focus specifically on the YouTube service. In particular, we study the feasibility of the recently proposed new steganographic technique [6] of hiding information directly in the structure of the mp4-encoded video file. Our statistical analysis of the set of 1000 video files stored by this service show the practical limitations for this type of information hiding.
LA - eng
KW - steganography; mp4 file; multimedia storage; YouTube; steganography; MP4 file; multimedia storage; YouTube video files; statistical analysis; Internet multimedia; practical limitations; transmission channel
UR - http://eudml.org/doc/246567
ER -
References
top- L. Bielik, The Raven paradox, logic, and methods of testing., Organon F, Internat. J. Anal. Philos. 18 (2011), 2, 213–225.
- F. Gahér, L. Bielik, M. Zouhar, On definitions and defining., Filozofia 65 (2010), 8, 719–737.
- Google, API Overview Guide., 2011, http://code.google.com/apis/youtube/gettingstarted.html#dataapi.
- O. Grošek, P. Horák, P. Zajac, 10.1016/j.disc.2008.03.020, Discrete Math. 309 (2009), 18, 5527–5534. Zbl1190.94025MR2567954DOI10.1016/j.disc.2008.03.020
- O. Grošek, P. Zajac, Automated cryptanalysis., In: Encyclopedia of Artificial Intelligence (J. R. Rabunal Dopico, J. Dorado De La Calle, and A. Pazos Sierra, eds.), 2009, pp. 179–185.
- M. Jókay, The design of a steganographic system based on the internal MP4 file structures., WSEAS Trans. (2011), preprint.
- I. Moskowitz, G. Longdon, L. Chang, A new paradigm hidden in steganography., In: Workshop on new security paradigms (2000). ACM Press, New York, pp. 41–50.
- Motion Picture Experts Group, ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 12: ISO Base Media File Format., International Organization for Standardization, 2004.
- Motion Picture Experts Group, ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 14: MP4 File Format., International Organization for Standardization, 2004.
- F. Pereira C. N., E. Touradj, The MPEG-4 Book., Upper Saddle River, Prentice Hall PTR, NJ 2002.
- K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, S. Chandrasekaran, 10.1109/TIP.2004.837557, In: IEEE Trans. Image Process. 14 (2004), 1627–1639. DOI10.1109/TIP.2004.837557
- M. Vojvoda, A survey of security mechanisms in mobile communication systems., Tatra Mt. Math. Publ. 25 (2002), 101–117. Zbl1050.94533MR1976476
- M. Vojvoda, O. Grošek, Postranné kanály v kryptoanalýze., EE časopis pre elektrotechniku a energetiku 14 14 (2008), 26–29.
- Wikipedia, Comparison of Video Services., 2010, http://en.wikipedia.org/wiki/Comparison_of_video_services.
- C. Xu, X. Ping, T. Zhang, Steganography in compressed video stream., In: Proc. First Internat. Conference of Innovative Computing, Information and Control (2006).
- YouTube, YouTube Homepage., 2011, http://www.youtube.com.
- P. Zajac, Ciphertext language identification., J. Electr. Engrg. 57 (2006), 7/s, 26–29. Zbl1159.94375
- P. Zajac, On the use of the method of syllogisms in algebraic cryptanalysis., In: Proc. 1st Plenary Conference of the NIL-I-004: Bergen 2009, pp. 21–30
NotesEmbed ?
topTo embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.