Deceptive Techniques to Hide a Compressed Video Stream for Information Security.
Jeonghwan Heo,Jechang Jeong +1 more
Reads0
Chats0
TLDR
In this article, the authors proposed a new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised devices shows the secret video for deceptive security.Abstract:
With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video.read more
Citations
More filters
Proceedings ArticleDOI
Video Steganography in IoT: Information Embedding using OpenCV and 2LSB
TL;DR: In this article , a video steganography technique for securing data transmission in IoT devices has been proposed using OpenCV and Least Significant Bit (LSB) techniques, which facilitates the identification of suitable regions of interest for concealing secret data, leading to enhanced robustness in hiding information.
References
More filters
Journal ArticleDOI
Discrete Cosine Transform
TL;DR: In this article, a discrete cosine transform (DCT) is defined and an algorithm to compute it using the fast Fourier transform is developed, which can be used in the area of digital processing for the purposes of pattern recognition and Wiener filtering.
Journal ArticleDOI
The MPEG-DASH Standard for Multimedia Streaming Over the Internet
TL;DR: A new standard to enable dynamic and adaptive streaming of media over HTTP is finalized, which aims to address the interoperability needs between devices and servers of various vendors.
Proceedings ArticleDOI
Methods for encrypting and decrypting MPEG video data efficiently
TL;DR: One of the methods is almost as e@cient as the existing video encoding and decoding process while providing considerable level of security without affeciing the quality of images when decrypted, and based on the wideiy used JPEG and MPEG standards.
Journal ArticleDOI
MPEG digital video-coding standards
TL;DR: An overview of the MPEG video-coding algorithms and standards and their role in video communications is provided and the basic elements of the forthcoming MPEG-4 standard are described.
Journal ArticleDOI
A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security
Gurpreet Singh,Supriya Supriya +1 more
TL;DR: A survey of various Encryption Algorithms is presented and it is shown that the art of cryptography has become more complex in order to make information more secure.