DocumentCode :
2597910
Title :
Video steganography using Flash Video (FLV)
Author :
Mozo, A.J. ; Obien, M.E. ; Rigor, C.J. ; Rayel, D.F. ; Chua, Kee-Chaing ; Tangonan, G.
Author_Institution :
Electron., Commun. & Comput. Eng. Dept., Ateneo de Manila Univ., Quezon City, Philippines
fYear :
2009
fDate :
5-7 May 2009
Firstpage :
822
Lastpage :
827
Abstract :
This paper aims to describe our research and software implementation in the field of video steganography. Because of security threats today through modern malevolent technology, confidential information is at risk such as medical records and banking or financial data. The group provided a solution by protecting this sensitive information inside videos. The project focused on using Flash Videos (.flv file extension) because of its simple file structure, its relatively small size compared to other video file formats, and its popularity in video-hosting websites. Intensive experimentation on how the FLV file structure can be manipulated to hold additional data were done. Through these experiments, the characteristics of the FLV provided the group to implement a C++ program that features embedding any type of data in the FLV, extracting that same hidden information, as well as compressing the FLV to compensate for the increase in file size. Very promising results include 100% lossless extraction, perfect original picture and sound quality for the uncompressed FLV embedded with data and uncompromised integrity of hidden data when modified FLVs are transferred through the Internet through e-mail or video-hosting websites. An application dealing with the medical records´ privacy is currently ongoing. Lastly, a recent article saying that doing steganography on a file that has been already “steganized” (“double-stegging”) could damage the file and jeopardize the extraction of the hidden file for the sake of making espionage work against itself. This statement have been supported and confirmed possible by the group as successive embedding using the Video Steganography program makes the original message “inextractable” using the same program.
Keywords :
data privacy; medical information systems; medical signal processing; security of data; steganography; video signal processing; C++ program; FLV; flash video; malevolent technology; medical record privacy; security threats; video steganography; video-hosting websites; Biomedical engineering; Biomedical imaging; Cities and towns; Data mining; Data security; Information security; Instrumentation and measurement; Privacy; Steganography; Videoconference; FLV; double-stegging; embed; extract; medical data; privacy; steganography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Instrumentation and Measurement Technology Conference, 2009. I2MTC '09. IEEE
Conference_Location :
Singapore
ISSN :
1091-5281
Print_ISBN :
978-1-4244-3352-0
Type :
conf
DOI :
10.1109/IMTC.2009.5168563
Filename :
5168563
Link To Document :
بازگشت