2015
DOI: 10.7717/peerj-cs.7
|View full text |Cite
|
Sign up to set email alerts
|

Forensic analysis of video steganography tools

Abstract: Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Based on criteria such as timing/storage, network/OS/hardware, and value/transition based, covert attacks can be classified into various types. Some examples of covert channel attacks [28,29] are:…”
Section: Covert Channel Attacksmentioning
confidence: 99%
“…Based on criteria such as timing/storage, network/OS/hardware, and value/transition based, covert attacks can be classified into various types. Some examples of covert channel attacks [28,29] are:…”
Section: Covert Channel Attacksmentioning
confidence: 99%
“…This technique allows the perpetrator to hide information by inserting the information into other messages in the form of digital media such as text, images, audio or video without arousing suspicion. [10] [11]. Computer crimes related to the misuse of steganographic techniques have been reported through the mass media, including a report from Trend Micro November 2017 with the title "REDBALDKNIGHT's Daserf Backdoor Now Using Steganography".…”
Section: Introductionmentioning
confidence: 99%
“…The above described algorithm of steganography is very simple. Therefore, it will take less than half an hour for running a stego analysis of the hidden data if special forensics tools are applied [27]. In connection with this, we propose to introduce additional algorithm into the above described steganography algorithm.…”
Section: Formation Of a Steganocontainer For The Transmission Of Imentioning
confidence: 99%