Previous |  Up |  Next

Article

MSC: 62A10, 93E12
Keywords:
steganography; mp4 file; multimedia storage; YouTube
Summary:
The aim of this work is to analyze suitability of existing internet multimedia storage services to use as a covert (steganographic) transmission channel. After general overview we focus specifically on the YouTube service. In particular, we study the feasibility of the recently proposed new steganographic technique [6] of hiding information directly in the structure of the mp4-encoded video file. Our statistical analysis of the set of 1000 video files stored by this service show the practical limitations for this type of information hiding.
References:
[1] L. Bielik: The Raven paradox, logic, and methods of testing. Organon F, Internat. J. Anal. Philos. 18 (2011), 2, 213–225.
[2] F. Gahér, L. Bielik, M. Zouhar: On definitions and defining. Filozofia 65 (2010), 8, 719–737.
[4] O. Grošek, P. Horák, P. Zajac: On complexity of round transformations. Discrete Math. 309 (2009), 18, 5527–5534. DOI 10.1016/j.disc.2008.03.020 | MR 2567954 | Zbl 1190.94025
[5] O. Grošek, P. Zajac: Automated cryptanalysis. In: Encyclopedia of Artificial Intelligence (J. R. Rabunal Dopico, J. Dorado De La Calle, and A. Pazos Sierra, eds.), 2009, pp. 179–185.
[6] M. Jókay: The design of a steganographic system based on the internal MP4 file structures. WSEAS Trans. (2011), preprint.
[7] I. Moskowitz, G. Longdon, L. Chang: A new paradigm hidden in steganography. In: Workshop on new security paradigms (2000). ACM Press, New York, pp. 41–50.
[8] Motion Picture Experts Group: ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 12: ISO Base Media File Format. International Organization for Standardization, 2004.
[9] Motion Picture Experts Group: ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 14: MP4 File Format. International Organization for Standardization, 2004.
[10] F. Pereira C. N., E. Touradj: The MPEG-4 Book. Upper Saddle River, Prentice Hall PTR, NJ 2002.
[11] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, S. Chandrasekaran: Robust image-adaptive data hiding based on erasure and error correction. In: IEEE Trans. Image Process. 14 (2004), 1627–1639. DOI 10.1109/TIP.2004.837557
[12] M. Vojvoda: A survey of security mechanisms in mobile communication systems. Tatra Mt. Math. Publ. 25 (2002), 101–117. MR 1976476 | Zbl 1050.94533
[13] M. Vojvoda, O. Grošek: Postranné kanály v kryptoanalýze. EE časopis pre elektrotechniku a energetiku 14 14 (2008), 26–29.
[14] Wikipedia: Comparison of Video Services. 2010, http://en.wikipedia.org/wiki/Comparison_of_video_services
[15] C. Xu, X. Ping, T. Zhang: Steganography in compressed video stream. In: Proc. First Internat. Conference of Innovative Computing, Information and Control (2006).
[16] YouTube: YouTube Homepage. 2011, http://www.youtube.com
[17] P. Zajac: Ciphertext language identification. J. Electr. Engrg. 57 (2006), 7/s, 26–29. Zbl 1159.94375
[18] P. Zajac: On the use of the method of syllogisms in algebraic cryptanalysis. In: Proc. 1st Plenary Conference of the NIL-I-004: Bergen 2009, pp. 21–30
Partner of
EuDML logo