2015
DOI: 10.7287/peerj.preprints.1019v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Forensic analysis of video steganography tools

Abstract: Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities.In this work, we examine the embedding … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…The redundant bits are modified and replaced with the bits of the secret message to be exchanged by parties involved. This process prevents any third party lacking the knowledge of the secret key and the chosen embedding algorithm from discovering the embedded data or breaching the carrier file contents [3]. The general steganography process is summarized in Fig.1.…”
Section: The Anti-forensic Steganographymentioning
confidence: 99%
See 2 more Smart Citations
“…The redundant bits are modified and replaced with the bits of the secret message to be exchanged by parties involved. This process prevents any third party lacking the knowledge of the secret key and the chosen embedding algorithm from discovering the embedded data or breaching the carrier file contents [3]. The general steganography process is summarized in Fig.1.…”
Section: The Anti-forensic Steganographymentioning
confidence: 99%
“…According to [3], "Steganography is the art and science of hiding information in plain sight". Thus, through steganography, a stego-system unknown to third, uninvolved parties can be created to allow for data exchange under extremely secure conditions.…”
Section: The Anti-forensic Steganographymentioning
confidence: 99%
See 1 more Smart Citation
“…The hexadecimals are modified and replaced with the hexadecimals of the secret message to be exchanged by parties involved. This process prevents any third party lacking the knowledge of the secret key and the chosen embedding algorithm from discovering the embedded data or breaching the carrier file contents [3].…”
Section: The Anti-forensic Steganographymentioning
confidence: 99%
“…Thus, steganography introduces a higher level of complexity that would protect against attacks but at the same time create an obstacle for forensic investigations [3]. This paper will be proposing a new steganography approach inspired by the Advanced Encryption Standard (AES) process, a formal encryption method adopted by the National Institute of Standards and Technology of the US Government, and is accepted worldwide.…”
Section: Introductionmentioning
confidence: 99%