Deceptive Techniques to Hide a Compressed Video Stream for Information Security
With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transm...
Guardado en:
Autores principales: | , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/6d8a58483761494f8f154857e17e6f3e |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:6d8a58483761494f8f154857e17e6f3e |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:6d8a58483761494f8f154857e17e6f3e2021-11-11T19:11:06ZDeceptive Techniques to Hide a Compressed Video Stream for Information Security10.3390/s212172001424-8220https://doaj.org/article/6d8a58483761494f8f154857e17e6f3e2021-10-01T00:00:00Zhttps://www.mdpi.com/1424-8220/21/21/7200https://doaj.org/toc/1424-8220With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video.Jeonghwan HeoJechang JeongMDPI AGarticlecodecinformation securityvideo encryptiondeceptive techniqueshigh efficiency video codingH.264/AVCChemical technologyTP1-1185ENSensors, Vol 21, Iss 7200, p 7200 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
codec information security video encryption deceptive techniques high efficiency video coding H.264/AVC Chemical technology TP1-1185 |
spellingShingle |
codec information security video encryption deceptive techniques high efficiency video coding H.264/AVC Chemical technology TP1-1185 Jeonghwan Heo Jechang Jeong Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
description |
With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video. |
format |
article |
author |
Jeonghwan Heo Jechang Jeong |
author_facet |
Jeonghwan Heo Jechang Jeong |
author_sort |
Jeonghwan Heo |
title |
Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title_short |
Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title_full |
Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title_fullStr |
Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title_full_unstemmed |
Deceptive Techniques to Hide a Compressed Video Stream for Information Security |
title_sort |
deceptive techniques to hide a compressed video stream for information security |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/6d8a58483761494f8f154857e17e6f3e |
work_keys_str_mv |
AT jeonghwanheo deceptivetechniquestohideacompressedvideostreamforinformationsecurity AT jechangjeong deceptivetechniquestohideacompressedvideostreamforinformationsecurity |
_version_ |
1718431589796413440 |