Advertisement

The Use of Steganography to Control Multimedia Players

  • Grzegorz KozielEmail author
  • Marek Milosz
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 538)

Abstract

Addition of automatic control to a multimedia player is desirable. It allows a user to save his/her preferences inside the multimedia content. It also gives the possibility of reducing the media size or delete a chosen part of the recording. Moreover, this solution allows to steer multimedia players during stream transmission. This kind of control is achievable with the use of steganography. Transparent markers are added to an audio track. Each marker can code a group of orders. Orders are used to control the multimedia content flow and its parameters. Markers have a certain structure allowing to keep multiple orders together with their parameters. Each marker is precisely set in time and has enough capacity to keep 256 various orders or their groups. The least significant bit method was used to insert markers.

Keywords

Steganography Multimedia Control Steering 

References

  1. 1.
    Badura, S., Rymaszewski, S.: Transform domain steganography in DVD video and audio content. In: 2007 IEEE International Workshop on Imaging Systems and Techniques Book Series: IEEE International Workshop on Imaging Systems and Techniques, pp. 195–199 (2007)Google Scholar
  2. 2.
    Cvejic, N.: Algorithms for Audio Watermarking and Steganography. Oulu University Press, Oulu (2004)zbMATHGoogle Scholar
  3. 3.
    Djebbar, F., Ayad, B., Meraim, K.: Comparative study of digital audio steganography techniques. Eurasip J. Audio Speech Music Process. 2012, 1–16 (2012) (Article Number: 25)Google Scholar
  4. 4.
    Gomez-Coronel, S., Escalante-Ramirez, B., Acevedo-Mosqueda, M., et al.: Steganography in audio files by hermite transform. Appl. Math. Inf. Sci. 8(3), 959–966 (2014)CrossRefGoogle Scholar
  5. 5.
    Koziel, G.: Fourier transform based methods in sound steganography. Actual Probl. Econ. 120(6), 321–328 (2011). ISSN 1993-6788Google Scholar
  6. 6.
    Koziel, G.: Increasing steganographic capacity of the MF method. Actual Probl. Econ. 6(132), 367–373 (2012). ISSN 1993-6788Google Scholar
  7. 7.
    Koziel, G.: Steganography usage to control multimedia stream. Adv. Sci. Technol. 8(21), 5–8 (2014). doi: 10.12913/22998624.1091870CrossRefGoogle Scholar
  8. 8.
    Kumar, H., Anuradha: Enhanced LSB technique for audio steganography. In: 2012 Third International Conference on Computing Communication and Networking Technologies (ICCCNT), Book Series: International Conference on Computing Communication and Network Technologies (2012)Google Scholar
  9. 9.
    Lach, J.:. SBFS – steganography based file system. In: Proceedings of the 2008 1st International Conference on Information Technology, pp. 171–174 (2008)Google Scholar
  10. 10.
    Lipinski, P.: Watermarking software in practical applications. Bull. Pol. Acad. Sci. Tech. Sci. 59(1), 21–25 (2011)Google Scholar
  11. 11.
    Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol. 5332, pp. 1001–1018. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  12. 12.
    Shine, K.P., Krishna Kumar, S.: Extended bipolar echo kernel for audio watermarking. In: International Conference on Advances in Recent Technologies in Communication and Computing, IEEE Computer Society 2009, pp. 487–489 (2009)Google Scholar
  13. 13.
    Shirali-Shahreza, S., Sharif, M.: Adaptive wavelet domain audio steganography with high capacity and low error rate. In: Information and Emerging Technologies, ICIET 2007 (2007). doi: 10.1109/ICIET.2007.4381305
  14. 14.
    Srivastava, M., Rafiq, M.: Novel approach to secure communication using audio steganography. In: Mems, Nano and Smart Systems, PTS 1-6, Book Series: Advanced Materials Research, vol. 403–408, pp. 963-969 (2012)Google Scholar
  15. 15.
    Zielinska, E., Mazurczyk, W., Szczypiorski, K.: Trends in steganography. Commun. ACM 57(3), 86–95 (2014)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Institute of Computer Science, Department of Electrical Engineering and Computer ScienceLublin University of TechnologyLublinPoland

Personalised recommendations