scispace - formally typeset
Open AccessJournal ArticleDOI

Deceptive Techniques to Hide a Compressed Video Stream for Information Security.

Jeonghwan Heo, +1 more
- 29 Oct 2021 - 
- Vol. 21, Iss: 21, pp 7200
Reads0
Chats0
TLDR
In this article, the authors proposed a new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised devices shows the secret video for deceptive security.
Abstract
With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video.

read more

Citations
More filters
Proceedings ArticleDOI

Video Steganography in IoT: Information Embedding using OpenCV and 2LSB

TL;DR: In this article , a video steganography technique for securing data transmission in IoT devices has been proposed using OpenCV and Least Significant Bit (LSB) techniques, which facilitates the identification of suitable regions of interest for concealing secret data, leading to enhanced robustness in hiding information.
References
More filters
Journal ArticleDOI

Discrete Cosine Transform

TL;DR: In this article, a discrete cosine transform (DCT) is defined and an algorithm to compute it using the fast Fourier transform is developed, which can be used in the area of digital processing for the purposes of pattern recognition and Wiener filtering.
Journal ArticleDOI

The MPEG-DASH Standard for Multimedia Streaming Over the Internet

TL;DR: A new standard to enable dynamic and adaptive streaming of media over HTTP is finalized, which aims to address the interoperability needs between devices and servers of various vendors.
Proceedings ArticleDOI

Methods for encrypting and decrypting MPEG video data efficiently

TL;DR: One of the methods is almost as e@cient as the existing video encoding and decoding process while providing considerable level of security without affeciing the quality of images when decrypted, and based on the wideiy used JPEG and MPEG standards.
Journal ArticleDOI

MPEG digital video-coding standards

TL;DR: An overview of the MPEG video-coding algorithms and standards and their role in video communications is provided and the basic elements of the forthcoming MPEG-4 standard are described.
Journal ArticleDOI

A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security

TL;DR: A survey of various Encryption Algorithms is presented and it is shown that the art of cryptography has become more complex in order to make information more secure.
Related Papers (5)