Title:
|
On the suitability of the internet multimedia storage for steganographic information transfer in MP4 files (English) |
Author:
|
Jókay, Matúš |
Author:
|
Baroš, Ján |
Language:
|
English |
Journal:
|
Kybernetika |
ISSN:
|
0023-5954 |
Volume:
|
48 |
Issue:
|
3 |
Year:
|
2012 |
Pages:
|
522-535 |
Summary lang:
|
English |
. |
Category:
|
math |
. |
Summary:
|
The aim of this work is to analyze suitability of existing internet multimedia storage services to use as a covert (steganographic) transmission channel. After general overview we focus specifically on the YouTube service. In particular, we study the feasibility of the recently proposed new steganographic technique [6] of hiding information directly in the structure of the mp4-encoded video file. Our statistical analysis of the set of 1000 video files stored by this service show the practical limitations for this type of information hiding. (English) |
Keyword:
|
steganography |
Keyword:
|
mp4 file |
Keyword:
|
multimedia storage |
Keyword:
|
YouTube |
MSC:
|
62A10 |
MSC:
|
93E12 |
. |
Date available:
|
2012-08-31T16:00:56Z |
Last updated:
|
2013-09-24 |
Stable URL:
|
http://hdl.handle.net/10338.dmlcz/142954 |
. |
Reference:
|
[1] L. Bielik: The Raven paradox, logic, and methods of testing..Organon F, Internat. J. Anal. Philos. 18 (2011), 2, 213–225. |
Reference:
|
[2] F. Gahér, L. Bielik, M. Zouhar: On definitions and defining..Filozofia 65 (2010), 8, 719–737. |
Reference:
|
[3] Google: API Overview Guide..2011, http://code.google.com/apis/youtube/getting_started.html\#data_api. |
Reference:
|
[4] O. Grošek, P. Horák, P. Zajac: On complexity of round transformations..Discrete Math. 309 (2009), 18, 5527–5534. Zbl 1190.94025, MR 2567954, 10.1016/j.disc.2008.03.020 |
Reference:
|
[5] O. Grošek, P. Zajac: Automated cryptanalysis..In: Encyclopedia of Artificial Intelligence (J. R. Rabunal Dopico, J. Dorado De La Calle, and A. Pazos Sierra, eds.), 2009, pp. 179–185. |
Reference:
|
[6] M. Jókay: The design of a steganographic system based on the internal MP4 file structures..WSEAS Trans. (2011), preprint. |
Reference:
|
[7] I. Moskowitz, G. Longdon, L. Chang: A new paradigm hidden in steganography..In: Workshop on new security paradigms (2000). ACM Press, New York, pp. 41–50. |
Reference:
|
[8] Motion Picture Experts Group: ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 12: ISO Base Media File Format..International Organization for Standardization, 2004. |
Reference:
|
[9] Motion Picture Experts Group: ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 14: MP4 File Format..International Organization for Standardization, 2004. |
Reference:
|
[10] F. Pereira C. N., E. Touradj: The MPEG-4 Book..Upper Saddle River, Prentice Hall PTR, NJ 2002. |
Reference:
|
[11] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, S. Chandrasekaran: Robust image-adaptive data hiding based on erasure and error correction..In: IEEE Trans. Image Process. 14 (2004), 1627–1639. 10.1109/TIP.2004.837557 |
Reference:
|
[12] M. Vojvoda: A survey of security mechanisms in mobile communication systems..Tatra Mt. Math. Publ. 25 (2002), 101–117. Zbl 1050.94533, MR 1976476 |
Reference:
|
[13] M. Vojvoda, O. Grošek: Postranné kanály v kryptoanalýze..EE časopis pre elektrotechniku a energetiku 14 14 (2008), 26–29. |
Reference:
|
[14] Wikipedia: Comparison of Video Services..2010, http://en.wikipedia.org/wiki/Comparison_of_video_services. |
Reference:
|
[15] C. Xu, X. Ping, T. Zhang: Steganography in compressed video stream..In: Proc. First Internat. Conference of Innovative Computing, Information and Control (2006). |
Reference:
|
[16] YouTube: YouTube Homepage..2011, http://www.youtube.com. |
Reference:
|
[17] P. Zajac: Ciphertext language identification..J. Electr. Engrg. 57 (2006), 7/s, 26–29. Zbl 1159.94375 |
Reference:
|
[18] P. Zajac: On the use of the method of syllogisms in algebraic cryptanalysis..In: Proc. 1st Plenary Conference of the NIL-I-004: Bergen 2009, pp. 21–30 |
. |