Advertisement

Hiding Data in FLV Video File

  • Mohammed A. Atiea
  • Yousef B. Mahdy
  • Abdel-Rahman Hedar
Part of the Advances in Intelligent Systems and Computing book series (volume 167)

Abstract

Video Frame quality and statistical undetectability are two key issues related to steganography techniques. In this paper, we propose a novel flash video file (.flv file extension) information-embedding scheme in which the embedded information is reconstructed without knowing the original host flash video file. The proposed method presents high rate of information embedding and is robust to lossless and lossy compression. The characteristic of the proposed scheme is to use a weak point in the header information of flash video file to assist compression process. Experimental results have indicated that the method is robust against lossless and lossy compression.

Keywords

Steganography FLV lossless and lossy compression 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Zhang, X.: Efficient Data Hiding With Plus-Minus One or Two. IEEE Signal Processing Letters 17(7) (July 2010)Google Scholar
  2. 2.
    Mozo, A.J., Obien, M.E., Rigor, C.J., Rayel, D.F., Chua, K., Tangonan, G.: Video Steganography using Flash Video (FLV). In: I2MTC 2009 IEEE - International Instrumentation and Measurement Technology Conference (May 2009)Google Scholar
  3. 3.
    Chao, M.-W., Lin, C.-H., Yu, C.-W., Lee, T.-Y.: A High Capacity 3D Steganography Algorithm. IEEE Transactions on Visualization and Computer Graphics 15(2) (March/April 2009)Google Scholar
  4. 4.
    Cheng, Y.-M., Wang, C.-M.: A High-Capacity Steganographic Approach for 3D Polygonal Meshes. The Visual Computer 22(9) (2006)Google Scholar
  5. 5.
    Cayre, F., Macq, B.: Data Hiding on 3-D Triangle Meshes. IEEE Trans. Signal Processing 51(4) (2003)Google Scholar
  6. 6.
    Alia, M.A., Yahya, A.A.: Public-Key Steganography Based on Matching Method. European Journal of Scientific Research 40(2) (2010) ISSN 1450-216XGoogle Scholar
  7. 7.
    Chen, T.S., Chang, C.C., Hwang, M.S.: A Virtual Image Cryptosystem Based upon Vector Quantization. IEEE Transactions on Image Processing 7(10) (1998)Google Scholar
  8. 8.
    Langelaar, G.C., Lagendijk, R.L.: Optimal Differential Energy Watermarking of DCT Encoded Images and Video. IEEE Transactions on Image Processing 10(2) (2001)Google Scholar
  9. 9.
    Adobe Systems Incorporated. Video File Format Specification, Version 10. Adobe Systems Incorporated, http://download.macromedia.com/f4v/video_file_format_spec_v10_1.pdf (last retrieved 2011-12-20)

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Mohammed A. Atiea
    • 1
  • Yousef B. Mahdy
    • 1
  • Abdel-Rahman Hedar
    • 1
  1. 1.Computer Science Department, Faculty of Computers and InformationAssuit UniversityAssiutEgypt

Personalised recommendations