On the suitability of the internet multimedia storage for steganographic information transfer in MP4 files
Kybernetika, Tome 48 (2012) no. 3, pp. 522-535 Cet article a éte moissonné depuis la source Czech Digital Mathematics Library

Voir la notice de l'article

The aim of this work is to analyze suitability of existing internet multimedia storage services to use as a covert (steganographic) transmission channel. After general overview we focus specifically on the YouTube service. In particular, we study the feasibility of the recently proposed new steganographic technique [6] of hiding information directly in the structure of the mp4-encoded video file. Our statistical analysis of the set of 1000 video files stored by this service show the practical limitations for this type of information hiding.
The aim of this work is to analyze suitability of existing internet multimedia storage services to use as a covert (steganographic) transmission channel. After general overview we focus specifically on the YouTube service. In particular, we study the feasibility of the recently proposed new steganographic technique [6] of hiding information directly in the structure of the mp4-encoded video file. Our statistical analysis of the set of 1000 video files stored by this service show the practical limitations for this type of information hiding.
Classification : 62A10, 93E12
Keywords: steganography; mp4 file; multimedia storage; YouTube
@article{KYB_2012_48_3_a12,
     author = {J\'okay, Mat\'u\v{s} and Baro\v{s}, J\'an},
     title = {On the suitability of the internet multimedia storage for steganographic information transfer in {MP4} files},
     journal = {Kybernetika},
     pages = {522--535},
     year = {2012},
     volume = {48},
     number = {3},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/KYB_2012_48_3_a12/}
}
TY  - JOUR
AU  - Jókay, Matúš
AU  - Baroš, Ján
TI  - On the suitability of the internet multimedia storage for steganographic information transfer in MP4 files
JO  - Kybernetika
PY  - 2012
SP  - 522
EP  - 535
VL  - 48
IS  - 3
UR  - http://geodesic.mathdoc.fr/item/KYB_2012_48_3_a12/
LA  - en
ID  - KYB_2012_48_3_a12
ER  - 
%0 Journal Article
%A Jókay, Matúš
%A Baroš, Ján
%T On the suitability of the internet multimedia storage for steganographic information transfer in MP4 files
%J Kybernetika
%D 2012
%P 522-535
%V 48
%N 3
%U http://geodesic.mathdoc.fr/item/KYB_2012_48_3_a12/
%G en
%F KYB_2012_48_3_a12
Jókay, Matúš; Baroš, Ján. On the suitability of the internet multimedia storage for steganographic information transfer in MP4 files. Kybernetika, Tome 48 (2012) no. 3, pp. 522-535. http://geodesic.mathdoc.fr/item/KYB_2012_48_3_a12/

[1] L. Bielik: The Raven paradox, logic, and methods of testing. Organon F, Internat. J. Anal. Philos. 18 (2011), 2, 213–225.

[2] F. Gahér, L. Bielik, M. Zouhar: On definitions and defining. Filozofia 65 (2010), 8, 719–737.

[3] Google: API Overview Guide. 2011, http://code.google.com/apis/youtube/getting_started.html\#data_api

[4] O. Grošek, P. Horák, P. Zajac: On complexity of round transformations. Discrete Math. 309 (2009), 18, 5527–5534. | DOI | MR | Zbl

[5] O. Grošek, P. Zajac: Automated cryptanalysis. In: Encyclopedia of Artificial Intelligence (J. R. Rabunal Dopico, J. Dorado De La Calle, and A. Pazos Sierra, eds.), 2009, pp. 179–185.

[6] M. Jókay: The design of a steganographic system based on the internal MP4 file structures. WSEAS Trans. (2011), preprint.

[7] I. Moskowitz, G. Longdon, L. Chang: A new paradigm hidden in steganography. In: Workshop on new security paradigms (2000). ACM Press, New York, pp. 41–50.

[8] Motion Picture Experts Group: ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 12: ISO Base Media File Format. International Organization for Standardization, 2004.

[9] Motion Picture Experts Group: ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 14: MP4 File Format. International Organization for Standardization, 2004.

[10] F. Pereira C. N., E. Touradj: The MPEG-4 Book. Upper Saddle River, Prentice Hall PTR, NJ 2002.

[11] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, S. Chandrasekaran: Robust image-adaptive data hiding based on erasure and error correction. In: IEEE Trans. Image Process. 14 (2004), 1627–1639. | DOI

[12] M. Vojvoda: A survey of security mechanisms in mobile communication systems. Tatra Mt. Math. Publ. 25 (2002), 101–117. | MR | Zbl

[13] M. Vojvoda, O. Grošek: Postranné kanály v kryptoanalýze. EE časopis pre elektrotechniku a energetiku 14 14 (2008), 26–29.

[14] Wikipedia: Comparison of Video Services. 2010, http://en.wikipedia.org/wiki/Comparison_of_video_services

[15] C. Xu, X. Ping, T. Zhang: Steganography in compressed video stream. In: Proc. First Internat. Conference of Innovative Computing, Information and Control (2006).

[16] YouTube: YouTube Homepage. 2011, http://www.youtube.com

[17] P. Zajac: Ciphertext language identification. J. Electr. Engrg. 57 (2006), 7/s, 26–29. | Zbl

[18] P. Zajac: On the use of the method of syllogisms in algebraic cryptanalysis. In: Proc. 1st Plenary Conference of the NIL-I-004: Bergen 2009, pp. 21–30