Research of Methods of Steganographic Protection of Audio Information Based on Video Containers

Research of Methods of Steganographic Protection of Audio Information Based on Video Containers

Mykola Bilan, Andrii Bilan
DOI: 10.4018/978-1-7998-1290-6.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The chapter describes investigations of steganographic methods of information protection, which use containers represented by files in AVI format. MP3 audio files are selected as data that is embedded in the used container. For the introduction of audio data, the video container was divided into control and information parts. Secret data were embedded in the information part of the video file, which did not lead to distortions when the container file is played. Studies have been conducted to find repetitive blocks in the structure of a video container. The chapter analyzed the determination of the amount of embedded data for containers with different parameters: color saturation, video file resolution, video file length, compression quality, and frames per second. An algorithm has been developed for the introduction and extraction of information represented by sound formats.
Chapter Preview
Top

Steganographic Protection Of Information On The Basis Of Containers Of Various Formats

Currently, there are many methods of steganography. The earliest example of protection using steganography methods is reading the text from a pattern, when a secret pattern (key) with cutouts for individual letters is superimposed on a plain text sheet and cut-down text is readable.

With the development of the information society, the steganography methods have spread by leaps and bounds into the digital realm. The variety of methods of digital steganography is determined by the variety of types of information presentation and ways to embed information in a digital container. In addition to this, the following fundamental condition must be observed: the information being introduced must not violate the integrity of the data in the initial container.

The following container variants are available:

  • The container is generated by the stegosystem itself. An example is a program in which a Mandelbrot fractal is generated as a container for embedding a message (Sprott, 2019; Shehab, 2012; Dewangan, Sharma, & Bera, 2015). Such an approach can be called constructive steganography.

  • The container is selected from a set of containers. In this case, a large number of alternative containers is generated to then select the most suitable for hiding of the message. This approach can be called selective steganography. In this case, when selecting the optimal container from the set of generated, the most important requirement is the nature of the container. The only problem remains that even an optimally organized container allows to hide a small amount of data at a very large volume of the container itself.

  • The container comes from the outside of system. In this case, there is no possibility to select a container and to hide the message, the first container that is caught is not always appropriate to the embedded message. Such steganography is called non-alternative.

Complete Chapter List

Search this Book:
Reset