Steganography

From David's Wiki
Revision as of 19:59, 10 October 2019 by David (talk | contribs) (→‎=Methods)
\( \newcommand{\P}[]{\unicode{xB6}} \newcommand{\AA}[]{\unicode{x212B}} \newcommand{\empty}[]{\emptyset} \newcommand{\O}[]{\emptyset} \newcommand{\Alpha}[]{Α} \newcommand{\Beta}[]{Β} \newcommand{\Epsilon}[]{Ε} \newcommand{\Iota}[]{Ι} \newcommand{\Kappa}[]{Κ} \newcommand{\Rho}[]{Ρ} \newcommand{\Tau}[]{Τ} \newcommand{\Zeta}[]{Ζ} \newcommand{\Mu}[]{\unicode{x039C}} \newcommand{\Chi}[]{Χ} \newcommand{\Eta}[]{\unicode{x0397}} \newcommand{\Nu}[]{\unicode{x039D}} \newcommand{\Omicron}[]{\unicode{x039F}} \DeclareMathOperator{\sgn}{sgn} \def\oiint{\mathop{\vcenter{\mathchoice{\huge\unicode{x222F}\,}{\unicode{x222F}}{\unicode{x222F}}{\unicode{x222F}}}\,}\nolimits} \def\oiiint{\mathop{\vcenter{\mathchoice{\huge\unicode{x2230}\,}{\unicode{x2230}}{\unicode{x2230}}{\unicode{x2230}}}\,}\nolimits} \)

Steganography is hiding data. This can be in audio or videos. The challenge is that the data should be inperceptible to the viewer and recoverable after video compression (e.g. h264).


Requirements

  • Imperceptibility/Impalpability: The video with the embedded data should be visually identical
  • Robustness: The embedded data should not be disturbed by image processing and attacks.
  • Capacity: The amount of embedded data should be high
  • Security: The data should be highly secured. This can be done with encryption beforehand.

The difference between Steganography and Cryptography is the first point. Encryption results in scrambled text which can draw attention.

Attacks include packet loss, video clipping, video scaling.

Classifications

Various ways to classify steganography methods

Embedding Time

  • Preembedding: Embed data into the raw video. Spatial and transformation domains. This will need to survive the encoding process.
  • Intraembedding: Embed data into the video encoding: intra-prediction, motion vectors, pixel interpolation
  • Postembedding: Embed data into the encoded bitstream

Methods

Resources