skip to main content
10.1145/1456536.1456578acmconferencesArticle/Chapter ViewAbstractPublication PagesdocConference Proceedingsconference-collections
research-article

Video steganography for confidential documents: integrity, privacy and version control

Published:22 September 2008Publication History

ABSTRACT

The safety of communication in organizations is a very important issue. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. A non-conventional means to increase security is the use of steganography to hide documents in digital videos, which makes possible to hide higher amounts of information and documents than steganography in images. In this work, we present a steganography technique using MPEG-4 videos aiming to increase documents secrecy. We also propose an architecture for version control of collaborative documents using encryption techniques, together with steganography, providing authentication and electronic documents integrity.

References

  1. Siponen, M. T. and Oinas-Kukkonen, H. 2007. A review of information security issues and respective research contributions. SIGMIS Database 38, 1 (Feb. 2007), 60--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Petitcolas, P. A. B. "Information hiding terminology". Information Hiding, Springer Lecture Notes in Computer Science, p. 4, 1996.Google ScholarGoogle Scholar
  3. Becchini, R. and Petris, G. D. 1999. "Java Enabled MPEG-4 Services: The MPEG-J Framework". In Proceedings of the 6th ICISN (April 27 -- 29, 1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. L. Chang, et al. "A steganographic method based upon JPEG and quantization table modification". An International Journal - Information Science., 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Lou Chyan, et al. "A copyright protect scheme for digital images using visual cryptography technique". ACM, 2002.Google ScholarGoogle Scholar
  6. Noda H, et al., "Application of BPCPS Steganography to wavelet compressed video" International Conference on Image Processing (ICIP), IEEE, 2004.Google ScholarGoogle Scholar
  7. Lu, C. Shien. "Towards robust image watermarking: combining content-dependent key, moment normalization and side-informed embedding". IEEE, 2003.Google ScholarGoogle Scholar
  8. Ning Wu; David Robie; Russel, M. "The use of steganography to enhance error detection and correction in mpeg-2 video". IEEE, p. 6, 2002.Google ScholarGoogle Scholar
  9. Bijan G., et al. "Lossless watermarking of compressed media using reversibly decodable packets". Signal Processing, Elsevier Inc. All Rights Reserved, p. 11, 2003.Google ScholarGoogle Scholar
  10. Lonardi, M. J. A. S. "Authentication of LZ-77 compressed data". ACM Inc. All Rights Reserved, p. 6, 2003.Google ScholarGoogle Scholar
  11. Fenlin Liu; et al., B. "Real-time steganography in compressed video". MRCS, NCS, Springer, p. 6, 2006.Google ScholarGoogle Scholar
  12. Zhao, J. "In business today and tomorrow". ACM Communications of the ACM, p. 7, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ebrahimi, F. Pereira "The MPEG-4 book". IMSC Press Multimedia Series, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Wang, H. and Wang, S. Cyber warfare: steganography vs. steganalysis. Commun. ACM 47, 10 76--82, Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. GPAC Project on Advanced Content, available in http://gpac.sourceforge.net.Google ScholarGoogle Scholar
  16. ISO/MPEG n2801 (subpart 3) - MPEG-4 Systems - July 1999.Google ScholarGoogle Scholar
  17. Yin, F. Q. H. "A novel key-embedded scheme for secure video multicast systems". 2006, Computer and Electrical Engineering, Elsevier Inc. All Rights Reserved, p. 18, 2006.Google ScholarGoogle Scholar
  18. Wolf, A. W. G. "Steganography in a video conferencing system". 1998, Information Hiding, Springer, p. 16, 1998Google ScholarGoogle Scholar
  19. Wang, C., et. al "New image steganographic methods using run-length approach". 2004, Information Science, Elsevier Inc. All Rights Reserved, p. 16, 2004.Google ScholarGoogle Scholar
  20. Bijan G., M. D. C. "Lossless watermarking of compressed media using reversibly decodable packets". Signal Processing, Elsevier Inc. All Rights Reserved, p. 11, 2003.Google ScholarGoogle Scholar
  21. Dugelay, G. D. J.-L. "A guide tour of video watermarking". 2003, Signal Processing, Image Comunication, Elsevier Inc. All Rights Reserved, p. 20, 2003.Google ScholarGoogle Scholar
  22. Girod, F. H. B. "Watermarking of uncompressed and compressed video". 1998, Signal Processing, Elsevier Inc. All Rights Reserved, p. 19, 1998.Google ScholarGoogle Scholar
  23. ISO/IEC 13818 Information technology - generic coding of moving pictures and associated audio information - part 2: Video.Google ScholarGoogle Scholar
  24. Shaw, G. "Digital document integrity". In Proceedings of the 2000 ACM Workshops on Multimedia, Los Angeles, California, United States, October 30 - November 03, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Zuhua Shao, "Security of the design of time-stamped signatures", Journal of Computer and System Sciences Volume 72, Issue 4, Pages 690--705, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Ziad Sakr, Georganas D. N., Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location. ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 3, No. 3, August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Welch, T. A. "A technique for high-performance data compression" Computer. Vol. 17, pp. 8--19, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Pobiner, S. 2006. Collaborative multimedia learning environments. In CHI '06 Extended Abstracts on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 -- 27, 2006). CHI '06. ACM, New York, NY, 1235--1240. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Baliga, A. and Kilian, J. 2007. On covert collaboration. In Proceedings of the 9th Workshop on Multimedia &Amp; Security (Dallas, Texas, USA, September 20 -- 21, 2007). MM&Sec '07. ACM, New York, NY, 25--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Fitzpatrick, G., Marshall, P., and Phillips, A. 2006. CVS integration with notification and chat: lightweight software team collaboration. In Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work (Banff, Alberta, Canada, November 04 -- 08, 2006). CSCW '06. ACM, New York, NY, 49--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Yang, S. 2003 Security and Trust Management in Collaborative Computing. Doctoral Thesis. UMI Order Number: AAI3127699., University of Florida. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Video steganography for confidential documents: integrity, privacy and version control

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGDOC '08: Proceedings of the 26th annual ACM international conference on Design of communication
      September 2008
      303 pages
      ISBN:9781605580838
      DOI:10.1145/1456536

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 September 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate355of582submissions,61%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader