Previous |  Up |  Next

Article

Title: On the suitability of the internet multimedia storage for steganographic information transfer in MP4 files (English)
Author: Jókay, Matúš
Author: Baroš, Ján
Language: English
Journal: Kybernetika
ISSN: 0023-5954
Volume: 48
Issue: 3
Year: 2012
Pages: 522-535
Summary lang: English
.
Category: math
.
Summary: The aim of this work is to analyze suitability of existing internet multimedia storage services to use as a covert (steganographic) transmission channel. After general overview we focus specifically on the YouTube service. In particular, we study the feasibility of the recently proposed new steganographic technique [6] of hiding information directly in the structure of the mp4-encoded video file. Our statistical analysis of the set of 1000 video files stored by this service show the practical limitations for this type of information hiding. (English)
Keyword: steganography
Keyword: mp4 file
Keyword: multimedia storage
Keyword: YouTube
MSC: 62A10
MSC: 93E12
.
Date available: 2012-08-31T16:00:56Z
Last updated: 2013-09-24
Stable URL: http://hdl.handle.net/10338.dmlcz/142954
.
Reference: [1] L. Bielik: The Raven paradox, logic, and methods of testing..Organon F, Internat. J. Anal. Philos. 18 (2011), 2, 213–225.
Reference: [2] F. Gahér, L. Bielik, M. Zouhar: On definitions and defining..Filozofia 65 (2010), 8, 719–737.
Reference: [3] Google: API Overview Guide..2011, http://code.google.com/apis/youtube/getting_started.html\#data_api.
Reference: [4] O. Grošek, P. Horák, P. Zajac: On complexity of round transformations..Discrete Math. 309 (2009), 18, 5527–5534. Zbl 1190.94025, MR 2567954, 10.1016/j.disc.2008.03.020
Reference: [5] O. Grošek, P. Zajac: Automated cryptanalysis..In: Encyclopedia of Artificial Intelligence (J. R. Rabunal Dopico, J. Dorado De La Calle, and A. Pazos Sierra, eds.), 2009, pp. 179–185.
Reference: [6] M. Jókay: The design of a steganographic system based on the internal MP4 file structures..WSEAS Trans. (2011), preprint.
Reference: [7] I. Moskowitz, G. Longdon, L. Chang: A new paradigm hidden in steganography..In: Workshop on new security paradigms (2000). ACM Press, New York, pp. 41–50.
Reference: [8] Motion Picture Experts Group: ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 12: ISO Base Media File Format..International Organization for Standardization, 2004.
Reference: [9] Motion Picture Experts Group: ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 14: MP4 File Format..International Organization for Standardization, 2004.
Reference: [10] F. Pereira C. N., E. Touradj: The MPEG-4 Book..Upper Saddle River, Prentice Hall PTR, NJ 2002.
Reference: [11] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, S. Chandrasekaran: Robust image-adaptive data hiding based on erasure and error correction..In: IEEE Trans. Image Process. 14 (2004), 1627–1639. 10.1109/TIP.2004.837557
Reference: [12] M. Vojvoda: A survey of security mechanisms in mobile communication systems..Tatra Mt. Math. Publ. 25 (2002), 101–117. Zbl 1050.94533, MR 1976476
Reference: [13] M. Vojvoda, O. Grošek: Postranné kanály v kryptoanalýze..EE časopis pre elektrotechniku a energetiku 14 14 (2008), 26–29.
Reference: [14] Wikipedia: Comparison of Video Services..2010, http://en.wikipedia.org/wiki/Comparison_of_video_services.
Reference: [15] C. Xu, X. Ping, T. Zhang: Steganography in compressed video stream..In: Proc. First Internat. Conference of Innovative Computing, Information and Control (2006).
Reference: [16] YouTube: YouTube Homepage..2011, http://www.youtube.com.
Reference: [17] P. Zajac: Ciphertext language identification..J. Electr. Engrg. 57 (2006), 7/s, 26–29. Zbl 1159.94375
Reference: [18] P. Zajac: On the use of the method of syllogisms in algebraic cryptanalysis..In: Proc. 1st Plenary Conference of the NIL-I-004: Bergen 2009, pp. 21–30
.

Files

Files Size Format View
Kybernetika_48-2012-3_13.pdf 726.5Kb application/pdf View/Open
Back to standard record
Partner of
EuDML logo