ABSTRACT
The safety of communication in organizations is a very important issue. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. A non-conventional means to increase security is the use of steganography to hide documents in digital videos, which makes possible to hide higher amounts of information and documents than steganography in images. In this work, we present a steganography technique using MPEG-4 videos aiming to increase documents secrecy. We also propose an architecture for version control of collaborative documents using encryption techniques, together with steganography, providing authentication and electronic documents integrity.
- Siponen, M. T. and Oinas-Kukkonen, H. 2007. A review of information security issues and respective research contributions. SIGMIS Database 38, 1 (Feb. 2007), 60--80. Google ScholarDigital Library
- Petitcolas, P. A. B. "Information hiding terminology". Information Hiding, Springer Lecture Notes in Computer Science, p. 4, 1996.Google Scholar
- Becchini, R. and Petris, G. D. 1999. "Java Enabled MPEG-4 Services: The MPEG-J Framework". In Proceedings of the 6th ICISN (April 27 -- 29, 1999). Google ScholarDigital Library
- C. L. Chang, et al. "A steganographic method based upon JPEG and quantization table modification". An International Journal - Information Science., 2000. Google ScholarDigital Library
- Lou Chyan, et al. "A copyright protect scheme for digital images using visual cryptography technique". ACM, 2002.Google Scholar
- Noda H, et al., "Application of BPCPS Steganography to wavelet compressed video" International Conference on Image Processing (ICIP), IEEE, 2004.Google Scholar
- Lu, C. Shien. "Towards robust image watermarking: combining content-dependent key, moment normalization and side-informed embedding". IEEE, 2003.Google Scholar
- Ning Wu; David Robie; Russel, M. "The use of steganography to enhance error detection and correction in mpeg-2 video". IEEE, p. 6, 2002.Google Scholar
- Bijan G., et al. "Lossless watermarking of compressed media using reversibly decodable packets". Signal Processing, Elsevier Inc. All Rights Reserved, p. 11, 2003.Google Scholar
- Lonardi, M. J. A. S. "Authentication of LZ-77 compressed data". ACM Inc. All Rights Reserved, p. 6, 2003.Google Scholar
- Fenlin Liu; et al., B. "Real-time steganography in compressed video". MRCS, NCS, Springer, p. 6, 2006.Google Scholar
- Zhao, J. "In business today and tomorrow". ACM Communications of the ACM, p. 7, 1998. Google ScholarDigital Library
- Ebrahimi, F. Pereira "The MPEG-4 book". IMSC Press Multimedia Series, 2002. Google ScholarDigital Library
- Wang, H. and Wang, S. Cyber warfare: steganography vs. steganalysis. Commun. ACM 47, 10 76--82, Oct. 2004. Google ScholarDigital Library
- GPAC Project on Advanced Content, available in http://gpac.sourceforge.net.Google Scholar
- ISO/MPEG n2801 (subpart 3) - MPEG-4 Systems - July 1999.Google Scholar
- Yin, F. Q. H. "A novel key-embedded scheme for secure video multicast systems". 2006, Computer and Electrical Engineering, Elsevier Inc. All Rights Reserved, p. 18, 2006.Google Scholar
- Wolf, A. W. G. "Steganography in a video conferencing system". 1998, Information Hiding, Springer, p. 16, 1998Google Scholar
- Wang, C., et. al "New image steganographic methods using run-length approach". 2004, Information Science, Elsevier Inc. All Rights Reserved, p. 16, 2004.Google Scholar
- Bijan G., M. D. C. "Lossless watermarking of compressed media using reversibly decodable packets". Signal Processing, Elsevier Inc. All Rights Reserved, p. 11, 2003.Google Scholar
- Dugelay, G. D. J.-L. "A guide tour of video watermarking". 2003, Signal Processing, Image Comunication, Elsevier Inc. All Rights Reserved, p. 20, 2003.Google Scholar
- Girod, F. H. B. "Watermarking of uncompressed and compressed video". 1998, Signal Processing, Elsevier Inc. All Rights Reserved, p. 19, 1998.Google Scholar
- ISO/IEC 13818 Information technology - generic coding of moving pictures and associated audio information - part 2: Video.Google Scholar
- Shaw, G. "Digital document integrity". In Proceedings of the 2000 ACM Workshops on Multimedia, Los Angeles, California, United States, October 30 - November 03, 2000. Google ScholarDigital Library
- Zuhua Shao, "Security of the design of time-stamped signatures", Journal of Computer and System Sciences Volume 72, Issue 4, Pages 690--705, June 2006. Google ScholarDigital Library
- Ziad Sakr, Georganas D. N., Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location. ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 3, No. 3, August 2007. Google ScholarDigital Library
- Welch, T. A. "A technique for high-performance data compression" Computer. Vol. 17, pp. 8--19, 1984. Google ScholarDigital Library
- Pobiner, S. 2006. Collaborative multimedia learning environments. In CHI '06 Extended Abstracts on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 -- 27, 2006). CHI '06. ACM, New York, NY, 1235--1240. Google ScholarDigital Library
- Baliga, A. and Kilian, J. 2007. On covert collaboration. In Proceedings of the 9th Workshop on Multimedia &Amp; Security (Dallas, Texas, USA, September 20 -- 21, 2007). MM&Sec '07. ACM, New York, NY, 25--34. Google ScholarDigital Library
- Fitzpatrick, G., Marshall, P., and Phillips, A. 2006. CVS integration with notification and chat: lightweight software team collaboration. In Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work (Banff, Alberta, Canada, November 04 -- 08, 2006). CSCW '06. ACM, New York, NY, 49--58. Google ScholarDigital Library
- Yang, S. 2003 Security and Trust Management in Collaborative Computing. Doctoral Thesis. UMI Order Number: AAI3127699., University of Florida. Google ScholarDigital Library
Index Terms
- Video steganography for confidential documents: integrity, privacy and version control
Recommendations
LSB-Based Steganography Using Reflected Gray Code
Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to ...
Implementation of Least Significant Bit Steganography and statistical steganalysis
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyLeast Significant Bit (LSB) Steganography is a method for hidden information in such a way that can only be detected by its intended recipient. Steganography in Digital media becomes a challenging discipline, since the Human Auditory System (HAS) is ...
A JPEG-based statistically invisible steganography
ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and ServiceThe objective of steganography is to implement covert communication by hiding data in digital files such that there is no indication of the existence of hidden data; so an ideal steganographic system should be able to withstand all steganalysis methods--...
Comments